<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Weblate — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/weblate/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/weblate/feed.xml" rel="self" type="application/rss+xml"/><item><title>Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-privilege-escalation/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-privilege-escalation/</guid><description>Weblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, contains an improper privilege management vulnerability (CVE-2026-34393) affecting versions prior to 5.17. The vulnerability lies in the user patching API endpoint, which doesn&rsquo;t adequately restrict the scope of edits allowed. An attacker with low privileges could potentially exploit this flaw to modify data or settings beyond their authorized permissions. This issue was reported and patched in Weblate version 5.17. Successful exploitation can lead to data integrity issues, unauthorized access to sensitive information, and potentially, complete compromise of the Weblate instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to Weblate with a low-privileged user account.</li>
<li>Attacker identifies the user patching API endpoint (e.g., <code>/api/users/&lt;user_id&gt;</code>).</li>
<li>Attacker crafts a malicious API request to modify attributes of a different user account, potentially an administrator.</li>
<li>The attacker submits the request to the vulnerable API endpoint, exploiting the lack of proper scope validation.</li>
<li>The Weblate server processes the request without correctly verifying the attacker&rsquo;s authorization to modify the target user&rsquo;s attributes.</li>
<li>The target user&rsquo;s attributes are modified according to the attacker&rsquo;s request, potentially elevating the attacker&rsquo;s privileges or compromising the target user&rsquo;s account.</li>
<li>The attacker leverages the elevated privileges to access sensitive data or perform unauthorized actions within the Weblate system.</li>
<li>Attacker maintains persistent access by creating new admin accounts or backdoors within the Weblate system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34393 can lead to significant data breaches, unauthorized modifications, and complete compromise of the Weblate instance. An attacker could gain administrative access, modify translations, and potentially inject malicious content into localized software. The number of affected installations is currently unknown, but any Weblate instance running a version prior to 5.17 is vulnerable. Organizations that rely on Weblate for their localization workflows are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Weblate to version 5.17 or later to patch CVE-2026-34393.</li>
<li>Monitor Weblate&rsquo;s web server logs for suspicious API requests targeting the user patching endpoint (<code>/api/users/&lt;user_id&gt;</code>) as described in the Attack Chain (use the Sigma rule provided below).</li>
<li>Review user account permissions and audit logs for any unexpected privilege escalations.</li>
<li>Implement stricter input validation and authorization checks within the Weblate application to prevent similar vulnerabilities in the future.</li>
<li>Deploy the Sigma rule provided below to your SIEM to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>weblate</category><category>privilege-escalation</category><category>web-application</category></item><item><title>Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-rce/</link><pubDate>Wed, 15 Apr 2026 19:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-rce/</guid><description>Weblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, contains a vulnerability (CVE-2026-33435) in versions prior to 5.17. The flaw stems from the project backup functionality, which fails to adequately filter Git and Mercurial configuration files. This oversight can be exploited to achieve remote code execution (RCE) under certain circumstances. The vulnerability was reported and patched in version 5.17. Mitigation steps for unpatched systems involve restricting access to the project backup feature, as it is limited to users with project creation privileges. This vulnerability poses a significant risk, as successful exploitation can lead to complete system compromise, data breaches, and further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to a Weblate account with project creation privileges.</li>
<li>The attacker creates a malicious project containing crafted Git or Mercurial configuration files.</li>
<li>The attacker triggers a project backup.</li>
<li>The backup process fails to properly sanitize the malicious configuration files.</li>
<li>The backup is stored on the server, potentially overwriting existing files.</li>
<li>The Weblate server attempts to process or utilize the tainted configuration files.</li>
<li>Due to improper sanitization, the malicious configuration files trigger command execution within the Weblate server&rsquo;s environment.</li>
<li>The attacker achieves remote code execution, gaining control over the Weblate server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33435 can lead to remote code execution on the Weblate server. The impact includes potential data breaches, unauthorized access to localization projects, and complete compromise of the affected system. While the exact number of affected installations is unknown, organizations using vulnerable versions of Weblate risk significant operational disruption and data loss. Sectors utilizing Weblate for localization, such as software development, content creation, and e-commerce, are at increased risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weblate to version 5.17 or later to patch CVE-2026-33435.</li>
<li>If upgrading is not immediately feasible, restrict access to the project backup feature to only trusted users as recommended in the CVE description.</li>
<li>Monitor web server logs for unusual activity related to project backup downloads, focusing on requests to /admin/backup/ paths. Use the provided Sigma rule to detect unusual file downloads from the webserver.</li>
<li>Implement the provided Sigma rule to detect suspicious file uploads of git configuration files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33435</category><category>rce</category><category>weblate</category></item><item><title>Weblate Path Traversal Vulnerability in ZIP Download Feature (CVE-2026-34242)</title><link>https://feed.craftedsignal.io/briefs/2026-04-weblate-path-traversal/</link><pubDate>Wed, 15 Apr 2026 19:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-weblate-path-traversal/</guid><description>Weblate versions before 5.17 are vulnerable to path traversal due to improper verification of downloaded files in the ZIP download feature, potentially allowing attackers to access files outside the intended repository.</description><content:encoded><![CDATA[<p>Weblate, a web-based localization tool, has a path traversal vulnerability (CVE-2026-34242) affecting versions prior to 5.17. The vulnerability exists within the ZIP download feature, where the application fails to adequately verify downloaded files. This can allow an attacker to craft a malicious ZIP archive containing symbolic links that, when extracted by a user or the application itself, can lead to files outside of the intended repository being accessed. The vulnerability was reported and patched in version 5.17. Exploitation of this vulnerability requires a user to download and extract a maliciously crafted ZIP file.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Weblate instance running a version prior to 5.17.</li>
<li>Attacker gains access to a translation project, either legitimately (e.g., as a translator) or illegitimately (e.g., via compromised credentials or another vulnerability).</li>
<li>Attacker crafts a malicious ZIP archive containing symbolic links that point to sensitive files or directories outside the intended Weblate repository (e.g., <code>/etc/passwd</code>, application configuration files).</li>
<li>Attacker uploads the malicious ZIP archive to the Weblate project, potentially disguised as a legitimate translation file.</li>
<li>A user (e.g., an administrator or another translator) downloads the ZIP archive using the ZIP download feature.</li>
<li>The user extracts the ZIP archive on their local machine or, if Weblate automatically processes the ZIP, on the server.</li>
<li>The symbolic links within the extracted archive are resolved, potentially allowing access to sensitive files or directories outside the Weblate repository.</li>
<li>Attacker gains unauthorized access to sensitive information, potentially leading to further compromise of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-34242) can allow an attacker to read arbitrary files on the server where Weblate is installed or on a user&rsquo;s machine if the user downloads and extracts the crafted ZIP archive locally. This could lead to the exposure of sensitive information such as application configuration files, database credentials, or even system-level files, depending on the permissions of the user or the Weblate application. The severity is rated as HIGH with a CVSS v3.1 score of 7.7.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weblate to version 5.17 or later to patch CVE-2026-34242 (reference: Overview).</li>
<li>Implement file integrity monitoring on Weblate servers to detect unauthorized file access (reference: Attack Chain - step 7).</li>
<li>Deploy the Sigma rule to detect ZIP archive downloads containing suspicious filenames that might indicate path traversal attempts (reference: rules).</li>
<li>Educate users about the risks of downloading and extracting files from untrusted sources (reference: Overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>weblate</category><category>path-traversal</category><category>zip-archive</category><category>cve-2026-34242</category></item></channel></rss>