Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23535: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WeblateOrg wlc

0
High
VulnerabilityCVE-2026-23535cvecve-2026-23535cwe-22
Published: Fri Jan 16 2026 (01/16/2026, 19:08:24 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: wlc

Description

CVE-2026-23535 is a high-severity path traversal vulnerability in the Weblate command-line client (wlc) versions prior to 1. 17. 2. It allows a malicious Weblate server to instruct the client to write files to arbitrary locations on the user's filesystem during multi-translation downloads. Exploitation requires network access to a malicious or compromised Weblate server and user interaction to trigger the download. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized file writes, potentially leading to code execution or system compromise. The issue is fixed in wlc version 1. 17. 2. European organizations using vulnerable wlc versions should upgrade promptly and validate server trustworthiness.

AI-Powered Analysis

AILast updated: 01/23/2026, 20:39:14 UTC

Technical Analysis

CVE-2026-23535 is a path traversal vulnerability identified in the Weblate command-line client (wlc), a tool that interacts with Weblate's REST API to facilitate translation management. Specifically, versions of wlc prior to 1.17.2 contain a flaw in the multi-translation download functionality, where the client improperly limits pathname inputs. This improper validation allows a malicious or compromised Weblate server to craft responses that cause the client to write files outside the intended directory, potentially to arbitrary locations on the user's filesystem. This can lead to unauthorized file creation or overwriting, which may be leveraged to execute arbitrary code, corrupt system files, or disrupt normal operations. Exploitation requires the client to connect to a malicious server and initiate a multi-translation download, implying some level of user interaction or trust in the server. The vulnerability affects confidentiality by potentially exposing sensitive files, integrity by allowing unauthorized file modifications, and availability by possibly disrupting system functionality. The vulnerability has a CVSS 3.1 base score of 8.1, reflecting its high impact and moderate complexity of exploitation (network attack vector, high attack complexity, low privileges required, and user interaction needed). The issue was addressed in wlc version 1.17.2 by properly restricting pathname inputs to prevent traversal outside designated directories.

Potential Impact

For European organizations, the impact of CVE-2026-23535 can be significant, especially for those relying on Weblate and its command-line client for localization and translation workflows. Unauthorized file writes can lead to compromise of sensitive data, insertion of malicious code, or disruption of translation pipelines. This may result in intellectual property theft, operational downtime, or supply chain risks if compromised translations propagate into production software. Organizations with distributed development teams or those integrating Weblate into CI/CD pipelines are particularly at risk. The vulnerability could also be exploited to gain foothold within internal networks if attackers leverage the arbitrary write to deploy backdoors or escalate privileges. Given the reliance on open-source localization tools in European software ecosystems, the threat could affect a broad range of sectors including technology, automotive, finance, and government agencies.

Mitigation Recommendations

European organizations should immediately upgrade all instances of wlc to version 1.17.2 or later to remediate the vulnerability. Additionally, organizations should audit and restrict access to Weblate servers, ensuring only trusted servers are used by clients. Implement network segmentation and firewall rules to limit client connections to authorized Weblate endpoints. Employ monitoring and alerting on unusual file system changes on machines running wlc, particularly in directories used for translation downloads. Incorporate integrity checks and digital signatures for translation files to detect unauthorized modifications. Educate users about the risks of connecting to untrusted Weblate servers and enforce strict policies on client-server trust relationships. Finally, review and update incident response plans to address potential exploitation scenarios involving arbitrary file writes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.982Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696a8fc2b22c7ad868d78299

Added to database: 1/16/2026, 7:21:38 PM

Last enriched: 1/23/2026, 8:39:14 PM

Last updated: 2/6/2026, 9:04:11 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats