๐Ÿ” CVE Alert

CVE-2026-34244

MEDIUM 5.0

Weblate: SSRF via Project-Level Machinery Configuration

CVSS Score
5.0
EPSS Score
0.0%
EPSS Percentile
0th

Weblate is a web based localization tool. In versions prior to 5.17, a user with the project.edit permission (granted by the per-project "Administration" role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and reflects up to 200 characters of the response body back to the user in an error message. This constitutes a Server-Side Request Forgery (SSRF) with partial response read. This issue has been fixed in version 5.17. If developers are unable to immediately upgrade, they can limit available machinery services via WEBLATE_MACHINERY setting.

CWE CWE-200 CWE-918
Vendor weblateorg
Product weblate
Published Apr 15, 2026
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for weblateorg weblate

Be the first to know when new medium vulnerabilities affecting weblateorg weblate are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

WeblateOrg / weblate
< 517

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/WeblateOrg/weblate/security/advisories/GHSA-xrwr-fcw6-fmq8 github.com: https://github.com/WeblateOrg/weblate/commit/e619e9090202e4886b844c110d39308e7e882c0e