Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ffgh-3jrf-8wvh | Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:* |
Thu, 16 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weblate
Weblate weblate |
|
| Vendors & Products |
Weblate
Weblate weblate |
Wed, 15 Apr 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Weblate is a web based localization tool. In versions prior to 5.17, repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path shares the same string prefix as the repository path (for example, repo and repo_outside). This issue has been fixed in version 5.17. | |
| Title | Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-16T14:11:15.386Z
Reserved: 2026-04-10T17:31:45.787Z
Link: CVE-2026-40256
Updated: 2026-04-16T14:11:09.966Z
Status : Analyzed
Published: 2026-04-15T19:16:37.470
Modified: 2026-04-21T14:02:00.750
Link: CVE-2026-40256
No data.
OpenCVE Enrichment
Updated: 2026-04-16T09:12:23Z
Github GHSA