Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mqph-7h49-hqfm | Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:* |
Thu, 16 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weblate
Weblate weblate |
|
| Vendors & Products |
Weblate
Weblate weblate |
Wed, 15 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Weblate is a web based localization tool. In versions prior to 5.17, the translation memory API exposed unintended endpoints, which in turn didn't perform proper access control. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable this feature as the CDN add-on is not enabled by default. | |
| Title | Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository | |
| Weaknesses | CWE-200 CWE-22 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-16T14:10:15.340Z
Reserved: 2026-03-17T23:23:58.314Z
Link: CVE-2026-33220
Updated: 2026-04-16T14:10:05.870Z
Status : Analyzed
Published: 2026-04-15T19:16:35.130
Modified: 2026-04-21T14:10:42.463
Link: CVE-2026-33220
No data.
OpenCVE Enrichment
Updated: 2026-04-16T09:12:36Z
Github GHSA