HomeWeblateCVE-2026-27457

CVE-2026-27457

MEDIUM
4.3CVSS
Published: 2026-02-26
Updated: 2026-02-27
AI Analysis

Description

Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-200CWE-862CWE-862

Metadata

Primary Vendor
WEBLATE
Published
2/26/2026
Last Modified
2/27/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

weblate : weblate

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-27457 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com