Description
Weblate is a web based localization tool. In versions prior to 5.17, the webhook add-on did not utilize existing SSRF protections. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable the webhook add-on as a workaround.
Published: 2026-04-15
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery enabling a malicious actor to direct the Weblate server to access arbitrary internal network resources
Action: Apply Patch
AI Analysis

Impact

Weblate versions prior to 5.17 contain a flaw in the webhook add‑on that fails to invoke the platform’s SSRF protection mechanisms when performing outbound HTTP requests via fetch_url(). This results in Server‑Side Request Forgery, where an attacker can force Weblate to issue requests to arbitrary internal URLs, potentially exposing sensitive data or enabling further pivoting within the network. The vulnerability is classified as CWE‑918. The description does not indicate that expertise or special privileges beyond those granted to a user who can add or configure webhooks are necessary, so it is inferred that the attack likely requires at least user‑level access to the webhook configuration interface.

Affected Systems

Any installation of Weblate using the webhook add‑on and operating on a version older than 5.17 is vulnerable. The affected product is Weblate (WeblateOrg:weblate). No additional sub‑product information is provided.

Risk and Exploitability

The CVSS score of 4.1 categorises the flaw as medium severity, suggesting the risk is moderate. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalogue, indicating it is not currently known to be widely exploited. Exploitation requires the ability to configure or trigger the webhook add‑on; whether authentication or elevated privileges are necessary is not explicitly stated in the description, so that detail remains uncertain. The likely attack vector involves interacting with the web application’s configuration interface or tampering with incoming webhook data to trigger a fetch_url() call to an attacker‑controlled endpoint.

Generated by OpenCVE AI on April 15, 2026 at 22:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to Weblate 5.17 or newer, which includes the required SSRF protection in the webhook add‑on.
  • If an upgrade cannot be performed immediately, disable the webhook add‑on entirely to eliminate the attack surface.
  • Restrict outbound HTTP(S) traffic from the Weblate server to a minimal set of trusted destinations using firewall rules or network segmentation.
  • Monitor Weblate logs for unusual outbound requests or webhook activity that could indicate exploitation attempts.

Generated by OpenCVE AI on April 15, 2026 at 22:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-f8hv-g549-hwg2 Weblate: SSRF via the webhook add-on using unprotected fetch_url()
History

Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Weblate
Weblate weblate
Vendors & Products Weblate
Weblate weblate

Wed, 15 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Weblate is a web based localization tool. In versions prior to 5.17, the webhook add-on did not utilize existing SSRF protections. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable the webhook add-on as a workaround.
Title Weblate: SSRF via the webhook add-on using unprotected fetch_url()
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T20:01:56.793Z

Reserved: 2026-04-07T19:13:20.378Z

Link: CVE-2026-39845

cve-icon Vulnrichment

Updated: 2026-04-15T19:37:07.632Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-15T19:16:36.373

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-39845

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:12:27Z

Weaknesses