Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6j8j-4qp3-36p2 | Weblate Doesn't Invalidate API Token on Password Change |
Mon, 11 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:* |
Thu, 07 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weblate
Weblate weblate |
|
| Vendors & Products |
Weblate
Weblate weblate |
Thu, 07 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Weblate is a web based localization tool. Prior to version 5.17.1, when a user changes their password, browser sessions are correctly invalidated via "cycle_session_keys()", but DRF API tokens ("wlu_*" prefix) stored in "authtoken_token" are not revoked. This issue has been patched in version 5.17.1. | |
| Title | Weblate's API Token Not Invalidated on Password Change | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T14:45:40.554Z
Reserved: 2026-04-20T18:18:50.682Z
Link: CVE-2026-41519
Updated: 2026-05-07T14:45:35.982Z
Status : Analyzed
Published: 2026-05-07T15:16:07.160
Modified: 2026-05-11T17:00:55.653
Link: CVE-2026-41519
No data.
OpenCVE Enrichment
Updated: 2026-05-07T18:00:11Z
Github GHSA