Description
Weblate is a web based localization tool. In versions prior to 5.17, repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path shares the same string prefix as the repository path (for example, repo and repo_outside). This issue has been fixed in version 5.17.
Published: 2026-04-15
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file access
Action: Upgrade
AI Analysis

Impact

In Weblate releases before version 5.17, a repository‑boundary validation uses a simple string prefix check on resolved absolute paths. This check is not aware of individual path segments, allowing an attacker to create a symbolic link or junction whose external path starts with the same string as the repository root (e.g., "repo" and "repo_outside"). When such a path is resolved, the validation incorrectly accepts it as located within the repository, potentially exposing files that are outside the intended repository scope to the attacker. The vulnerability can compromise confidentiality by granting read access to arbitrary files stored on the server where Weblate is deployed.

Affected Systems

The flaw affects all Weblate installations running a version older than 5.17. Weblate versions 5.17 and newer contain a fix that makes the boundary check path‑segment aware.

Risk and Exploitability

The vulnerability carries a CVSS score of 5, indicating medium severity. No EPSS score is available, and the issue is not listed in CISA’s KEV catalog. While the exact exploitation probability is uncertain, the required action of creating a symlink or junction suggests that the attack vector is local or trusted‑user based, but could be leveraged remotely if an attacker gains permission to modify repository configurations or upload content. The risk is therefore moderate, emphasizing that the side effect is data exposure rather than code execution or denial of service.

Generated by OpenCVE AI on April 15, 2026 at 22:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Weblate version 5.17 or later to install the upstream fix.
  • If upgrading is not immediately possible, audit all repository paths and remove any symbolic links or junctions that share a string prefix with the repository root; avoid creating such paths in the future.
  • Review the repository‑boundary validation logic to ensure it is path‑segment aware; if necessary, apply the manual patch referenced by commit e30dbcb33ae78e754ecef192d54f996b89cb4e15 or equivalent code changes.

Generated by OpenCVE AI on April 15, 2026 at 22:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ffgh-3jrf-8wvh Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
History

Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Weblate
Weblate weblate
Vendors & Products Weblate
Weblate weblate

Wed, 15 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Weblate is a web based localization tool. In versions prior to 5.17, repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path shares the same string prefix as the repository path (for example, repo and repo_outside). This issue has been fixed in version 5.17.
Title Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-16T14:11:15.386Z

Reserved: 2026-04-10T17:31:45.787Z

Link: CVE-2026-40256

cve-icon Vulnrichment

Updated: 2026-04-16T14:11:09.966Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-15T19:16:37.470

Modified: 2026-04-17T15:38:09.243

Link: CVE-2026-40256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:12:23Z

Weaknesses