CVE-2026-27457: CWE-862: Missing Authorization in WeblateOrg weblate
Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.
AI Analysis
Technical Summary
Weblate is a web-based localization platform that facilitates collaborative translation management. In versions prior to 5.16.1, the REST API endpoint responsible for managing addons (AddonViewSet in weblate/api/views.py at line 2831) improperly handles authorization. Specifically, it uses a queryset defined as Addon.objects.all() without overriding the get_queryset() method to filter results based on the requesting user's permissions. This results in any authenticated user being able to access the full list of addons and retrieve details for any addon across all projects and components via the GET /api/addons/ and GET /api/addons/{id}/ endpoints. If the Weblate instance is configured without requiring login (REQUIRE_LOGIN not set), even anonymous users can exploit this flaw. The vulnerability corresponds to CWE-862 (Missing Authorization) and CWE-200 (Information Exposure). Although the flaw does not allow modification or deletion of data, it exposes potentially sensitive addon information to unauthorized users. The issue was addressed in Weblate version 5.16.1 by properly scoping the queryset to user permissions, thereby enforcing authorization checks. There are no known exploits in the wild as of the publication date, and the CVSS v3.1 base score is 4.3, reflecting a medium severity impact primarily on confidentiality with low attack complexity and requiring at least authenticated access unless login is disabled.
Potential Impact
The primary impact of CVE-2026-27457 is unauthorized disclosure of addon information within Weblate instances. This can lead to exposure of sensitive metadata about addons, which may include configuration details or other information that could aid an attacker in further reconnaissance or targeted attacks. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could undermine trust in the localization platform and potentially expose intellectual property or internal project details. Organizations relying on Weblate for managing translations across multiple projects may inadvertently expose addon data to unauthorized users, increasing the risk of information leakage. The impact is more pronounced in environments where REQUIRE_LOGIN is disabled, allowing anonymous access. Given Weblate's use in open source and enterprise environments worldwide, the vulnerability could affect a broad range of organizations, especially those with sensitive or proprietary localization workflows.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Weblate to version 5.16.1 or later, where the authorization checks are properly implemented. If immediate upgrade is not feasible, administrators should ensure that the REQUIRE_LOGIN setting is enabled to prevent anonymous access to the API endpoints. Additionally, restricting API access through network controls such as IP whitelisting or VPN-only access can reduce exposure. Monitoring API access logs for unusual or unauthorized requests to /api/addons/ endpoints can help detect exploitation attempts. Implementing role-based access controls and reviewing user permissions regularly will further limit the risk. Finally, organizations should audit their Weblate configurations and addon data to assess any potential information exposure and take corrective actions as needed.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Japan, Netherlands, Sweden, India
CVE-2026-27457: CWE-862: Missing Authorization in WeblateOrg weblate
Description
Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.
AI-Powered Analysis
Technical Analysis
Weblate is a web-based localization platform that facilitates collaborative translation management. In versions prior to 5.16.1, the REST API endpoint responsible for managing addons (AddonViewSet in weblate/api/views.py at line 2831) improperly handles authorization. Specifically, it uses a queryset defined as Addon.objects.all() without overriding the get_queryset() method to filter results based on the requesting user's permissions. This results in any authenticated user being able to access the full list of addons and retrieve details for any addon across all projects and components via the GET /api/addons/ and GET /api/addons/{id}/ endpoints. If the Weblate instance is configured without requiring login (REQUIRE_LOGIN not set), even anonymous users can exploit this flaw. The vulnerability corresponds to CWE-862 (Missing Authorization) and CWE-200 (Information Exposure). Although the flaw does not allow modification or deletion of data, it exposes potentially sensitive addon information to unauthorized users. The issue was addressed in Weblate version 5.16.1 by properly scoping the queryset to user permissions, thereby enforcing authorization checks. There are no known exploits in the wild as of the publication date, and the CVSS v3.1 base score is 4.3, reflecting a medium severity impact primarily on confidentiality with low attack complexity and requiring at least authenticated access unless login is disabled.
Potential Impact
The primary impact of CVE-2026-27457 is unauthorized disclosure of addon information within Weblate instances. This can lead to exposure of sensitive metadata about addons, which may include configuration details or other information that could aid an attacker in further reconnaissance or targeted attacks. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could undermine trust in the localization platform and potentially expose intellectual property or internal project details. Organizations relying on Weblate for managing translations across multiple projects may inadvertently expose addon data to unauthorized users, increasing the risk of information leakage. The impact is more pronounced in environments where REQUIRE_LOGIN is disabled, allowing anonymous access. Given Weblate's use in open source and enterprise environments worldwide, the vulnerability could affect a broad range of organizations, especially those with sensitive or proprietary localization workflows.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Weblate to version 5.16.1 or later, where the authorization checks are properly implemented. If immediate upgrade is not feasible, administrators should ensure that the REQUIRE_LOGIN setting is enabled to prevent anonymous access to the API endpoints. Additionally, restricting API access through network controls such as IP whitelisting or VPN-only access can reduce exposure. Monitoring API access logs for unusual or unauthorized requests to /api/addons/ endpoints can help detect exploitation attempts. Implementing role-based access controls and reviewing user permissions regularly will further limit the risk. Finally, organizations should audit their Weblate configurations and addon data to assess any potential information exposure and take corrective actions as needed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-19T17:25:31.100Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0c5b685912abc710cd5ce
Added to database: 2/26/2026, 10:14:14 PM
Last enriched: 2/26/2026, 10:27:52 PM
Last updated: 2/27/2026, 2:24:49 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3274: Buffer Overflow in Tenda F453
HighCVE-2026-3037: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25721: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25196: CWE-78 in Copeland Copeland XWEB 300D PRO
HighCVE-2026-25105: CWE-78 in Copeland Copeland XWEB 300D PRO
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.