<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-34242 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-34242/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 19:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-34242/feed.xml" rel="self" type="application/rss+xml"/><item><title>Weblate Path Traversal Vulnerability in ZIP Download Feature (CVE-2026-34242)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-path-traversal/</link><pubDate>Wed, 15 Apr 2026 19:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-path-traversal/</guid><description>Weblate versions before 5.17 are vulnerable to path traversal due to improper verification of downloaded files in the ZIP download feature, potentially allowing attackers to access files outside the intended repository.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, has a path traversal vulnerability (CVE-2026-34242) affecting versions prior to 5.17. The vulnerability exists within the ZIP download feature, where the application fails to adequately verify downloaded files. This can allow an attacker to craft a malicious ZIP archive containing symbolic links that, when extracted by a user or the application itself, can lead to files outside of the intended repository being accessed. The vulnerability was reported and patched in version 5.17. Exploitation of this vulnerability requires a user to download and extract a maliciously crafted ZIP file.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Weblate instance running a version prior to 5.17.</li>
<li>Attacker gains access to a translation project, either legitimately (e.g., as a translator) or illegitimately (e.g., via compromised credentials or another vulnerability).</li>
<li>Attacker crafts a malicious ZIP archive containing symbolic links that point to sensitive files or directories outside the intended Weblate repository (e.g., <code>/etc/passwd</code>, application configuration files).</li>
<li>Attacker uploads the malicious ZIP archive to the Weblate project, potentially disguised as a legitimate translation file.</li>
<li>A user (e.g., an administrator or another translator) downloads the ZIP archive using the ZIP download feature.</li>
<li>The user extracts the ZIP archive on their local machine or, if Weblate automatically processes the ZIP, on the server.</li>
<li>The symbolic links within the extracted archive are resolved, potentially allowing access to sensitive files or directories outside the Weblate repository.</li>
<li>Attacker gains unauthorized access to sensitive information, potentially leading to further compromise of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-34242) can allow an attacker to read arbitrary files on the server where Weblate is installed or on a user&rsquo;s machine if the user downloads and extracts the crafted ZIP archive locally. This could lead to the exposure of sensitive information such as application configuration files, database credentials, or even system-level files, depending on the permissions of the user or the Weblate application. The severity is rated as HIGH with a CVSS v3.1 score of 7.7.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weblate to version 5.17 or later to patch CVE-2026-34242 (reference: Overview).</li>
<li>Implement file integrity monitoring on Weblate servers to detect unauthorized file access (reference: Attack Chain - step 7).</li>
<li>Deploy the Sigma rule to detect ZIP archive downloads containing suspicious filenames that might indicate path traversal attempts (reference: rules).</li>
<li>Educate users about the risks of downloading and extracting files from untrusted sources (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>weblate</category><category>path-traversal</category><category>zip-archive</category><category>cve-2026-34242</category></item></channel></rss>