๐Ÿ” CVE Alert

CVE-2026-27457

MEDIUM 4.3

Weblate: Missing access control for the AddonViewSet API exposes all addon configurations

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th

Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.

CWE CWE-862 CWE-200
Vendor weblateorg
Product weblate
Published Feb 26, 2026
Last Updated Mar 3, 2026
Stay Ahead of the Next One

Get instant alerts for weblateorg weblate

Be the first to know when new medium vulnerabilities affecting weblateorg weblate are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

WeblateOrg / weblate
< 5.16.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/WeblateOrg/weblate/security/advisories/GHSA-wppc-7cq7-cgfv github.com: https://github.com/WeblateOrg/weblate/pull/18107 github.com: https://github.com/WeblateOrg/weblate/pull/18164 github.com: https://github.com/WeblateOrg/weblate/commit/3f58f9a4152bc0cbdd6eff5954f9c7bc4d9f0af9 github.com: https://github.com/WeblateOrg/weblate/commit/7802c9b121eb407c48d4adddd4f2458fb3efef0f github.com: https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.16.1