CVE-2026-27457
Weblate: Missing access control for the AddonViewSet API exposes all addon configurations
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.
| CWE | CWE-862 CWE-200 |
| Vendor | weblateorg |
| Product | weblate |
| Published | Feb 26, 2026 |
| Last Updated | Mar 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for weblateorg weblate
Be the first to know when new medium vulnerabilities affecting weblateorg weblate are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Affected Versions
WeblateOrg / weblate
< 5.16.1
References
github.com: https://github.com/WeblateOrg/weblate/security/advisories/GHSA-wppc-7cq7-cgfv github.com: https://github.com/WeblateOrg/weblate/pull/18107 github.com: https://github.com/WeblateOrg/weblate/pull/18164 github.com: https://github.com/WeblateOrg/weblate/commit/3f58f9a4152bc0cbdd6eff5954f9c7bc4d9f0af9 github.com: https://github.com/WeblateOrg/weblate/commit/7802c9b121eb407c48d4adddd4f2458fb3efef0f github.com: https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.16.1