Impact
In Weblate versions below 5.17, the translation memory API exposed unintended endpoints that did not enforce proper access control. An attacker can abuse these endpoints to read any local file on the server, including files outside the project repository. This allows the disclosure of sensitive data and represents a confidentiality compromise.
Affected Systems
The flaw is present in all Weblate installations from WeblateOrg that run versions earlier than 5.17. It is specifically tied to the CDN add‑on, a feature that is not enabled by default but can be activated by administrators.
Risk and Exploitability
The CVSS score of 6.8 reflects a moderate severity, with a missing EPSS score and no presence in the KEV catalog. The vulnerability can be exploited by users who are able to reach the exposed API endpoints, which may include authenticated users or any user with network access to the web application. Because the attack bypasses access controls, an attacker can read arbitrary files on the host machine. Mitigation requires an update or disabling of the add‑on to block the vulnerable endpoints.
OpenCVE Enrichment
Github GHSA