Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mmwx-79f6-67jg | Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command |
Wed, 18 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weblate
Weblate wlc |
|
| CPEs | cpe:2.3:a:weblate:wlc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Weblate
Weblate wlc |
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weblateorg
Weblateorg wlc |
|
| Vendors & Products |
Weblateorg
Weblateorg wlc |
Fri, 16 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2. | |
| Title | wlc Path traversal: Unsanitized API slugs in download command | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-16T19:21:22.629Z
Reserved: 2026-01-13T18:22:43.982Z
Link: CVE-2026-23535
Updated: 2026-01-16T19:21:13.765Z
Status : Analyzed
Published: 2026-01-16T19:16:19.407
Modified: 2026-02-18T16:26:25.577
Link: CVE-2026-23535
No data.
OpenCVE Enrichment
Updated: 2026-04-18T16:15:04Z
Github GHSA