Impact
The vulnerability resides in Weblate's public API endpoints for screenshots, tasks, and component links, allowing an authenticated or unauthenticated user to enumerate translations in projects that the user should not access. This leads to information disclosure of translation strings and project structure that can be used for further reconnaissance. The weakness is classified as CWE‑203, indicating an improper handling of sensitive information.
Affected Systems
Impactful for installations running Weblate versions prior to 5.17.1. The affected vendor is WeblateOrg, and the product is the Weblate localization platform. All deployments of the affected release that expose the screenshot, tasks, or component link API to users lacking proper project permissions are potentially vulnerable.
Risk and Exploitability
The CVSS score of 4.3 places the flaw in the low‑to‑medium severity range, and EPSS data is not available, meaning no current measured exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers can likely exploit the flaw by sending requests to the screenshot API endpoint, bypassing access controls to glean available translations for restricted projects.
OpenCVE Enrichment
Github GHSA