Description
Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can limit the scope of the vulnerability by restricting access to the project backup, as it is only accessible to users who can create projects.
Published: 2026-04-15
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

Weblate's backup functionality in versions before 5.17 fails to sanitize Git and Mercurial configuration files, allowing an attacker to craft a payload that is executed when the backup is restored. This flaw enables remote code execution on the system hosting Weblate, potentially granting full system compromise. The weakness involves path traversal and arbitrary code inclusion, classified under CWEs 23, 434, and 94.

Affected Systems

The affected product is Weblate, provided by WeblateOrg. Vulnerable versions are all releases older than 5.17. Users running those versions should verify their current build and consider an upgrade.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.1, indicating high severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. The exploit requires remote access to the project backup endpoint, which is only available to users who have project‑creation permissions, making the attack vector feasible for authenticated users within the Weblate installation. Inferred that an attacker could place malicious configuration files in a project repository and trigger RCE during a backup restore performed by a privileged user.

Generated by OpenCVE AI on April 15, 2026 at 22:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Weblate 5.17 or newer update to eliminate the backup sanitization defect.
  • If an immediate upgrade is not possible, limit backup functionality to trusted users only or disable the backup endpoint altogether.
  • Before restoring a backup, remove or sanitize any Git or Mercurial configuration files to ensure no malicious code is executed.

Generated by OpenCVE AI on April 15, 2026 at 22:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-558g-h753-6m33 Weblate: Remote code execution during backup restoration
History

Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Weblate
Weblate weblate
Vendors & Products Weblate
Weblate weblate

Wed, 15 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can limit the scope of the vulnerability by restricting access to the project backup, as it is only accessible to users who can create projects.
Title Weblate: Remote code execution during backup restoration
Weaknesses CWE-23
CWE-434
CWE-94
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T18:40:27.204Z

Reserved: 2026-03-19T18:45:22.436Z

Link: CVE-2026-33435

cve-icon Vulnrichment

Updated: 2026-04-15T18:40:21.788Z

cve-icon NVD

Status : Received

Published: 2026-04-15T19:16:35.277

Modified: 2026-04-15T19:16:35.277

Link: CVE-2026-33435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:12:34Z

Weaknesses