CVE-2026-42150
wlc: print_html outputs API data without HTML escaping, enabling stored XSS
CVSS Score
5.1
EPSS Score
0.0%
EPSS Percentile
9th
wlc is a Weblate command-line client using Weblate's REST API. Prior to version 2.0.0, the HTML output format in wlc embeds API response data into HTML without escaping, allowing cross-site scripting when the output is rendered in a browser. This issue has been patched in version 2.0.0.
| CWE | CWE-79 |
| Vendor | weblateorg |
| Product | wlc |
| Published | May 8, 2026 |
| Last Updated | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for weblateorg wlc
Be the first to know when new medium vulnerabilities affecting weblateorg wlc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
WeblateOrg / wlc
< 2.0.0
References
github.com: https://github.com/WeblateOrg/wlc/security/advisories/GHSA-gx2m-mcc2-r4p3 github.com: https://github.com/WeblateOrg/wlc/pull/1327 github.com: https://github.com/WeblateOrg/wlc/commit/0f3e58f6d7457b05d48ef40f579a172c4c8b8469 github.com: https://github.com/WeblateOrg/wlc/releases/tag/2.0.0