Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27457: CWE-862: Missing Authorization in WeblateOrg weblate

0
Medium
VulnerabilityCVE-2026-27457cvecve-2026-27457cwe-862cwe-200
Published: Thu Feb 26 2026 (02/26/2026, 21:56:03 UTC)
Source: CVE Database V5
Vendor/Project: WeblateOrg
Product: weblate

Description

Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.

AI-Powered Analysis

AILast updated: 02/26/2026, 22:27:52 UTC

Technical Analysis

Weblate is a web-based localization platform that facilitates collaborative translation management. In versions prior to 5.16.1, the REST API endpoint responsible for managing addons (AddonViewSet in weblate/api/views.py at line 2831) improperly handles authorization. Specifically, it uses a queryset defined as Addon.objects.all() without overriding the get_queryset() method to filter results based on the requesting user's permissions. This results in any authenticated user being able to access the full list of addons and retrieve details for any addon across all projects and components via the GET /api/addons/ and GET /api/addons/{id}/ endpoints. If the Weblate instance is configured without requiring login (REQUIRE_LOGIN not set), even anonymous users can exploit this flaw. The vulnerability corresponds to CWE-862 (Missing Authorization) and CWE-200 (Information Exposure). Although the flaw does not allow modification or deletion of data, it exposes potentially sensitive addon information to unauthorized users. The issue was addressed in Weblate version 5.16.1 by properly scoping the queryset to user permissions, thereby enforcing authorization checks. There are no known exploits in the wild as of the publication date, and the CVSS v3.1 base score is 4.3, reflecting a medium severity impact primarily on confidentiality with low attack complexity and requiring at least authenticated access unless login is disabled.

Potential Impact

The primary impact of CVE-2026-27457 is unauthorized disclosure of addon information within Weblate instances. This can lead to exposure of sensitive metadata about addons, which may include configuration details or other information that could aid an attacker in further reconnaissance or targeted attacks. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could undermine trust in the localization platform and potentially expose intellectual property or internal project details. Organizations relying on Weblate for managing translations across multiple projects may inadvertently expose addon data to unauthorized users, increasing the risk of information leakage. The impact is more pronounced in environments where REQUIRE_LOGIN is disabled, allowing anonymous access. Given Weblate's use in open source and enterprise environments worldwide, the vulnerability could affect a broad range of organizations, especially those with sensitive or proprietary localization workflows.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Weblate to version 5.16.1 or later, where the authorization checks are properly implemented. If immediate upgrade is not feasible, administrators should ensure that the REQUIRE_LOGIN setting is enabled to prevent anonymous access to the API endpoints. Additionally, restricting API access through network controls such as IP whitelisting or VPN-only access can reduce exposure. Monitoring API access logs for unusual or unauthorized requests to /api/addons/ endpoints can help detect exploitation attempts. Implementing role-based access controls and reviewing user permissions regularly will further limit the risk. Finally, organizations should audit their Weblate configurations and addon data to assess any potential information exposure and take corrective actions as needed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-19T17:25:31.100Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c5b685912abc710cd5ce

Added to database: 2/26/2026, 10:14:14 PM

Last enriched: 2/26/2026, 10:27:52 PM

Last updated: 2/27/2026, 2:24:49 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses