Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22251

Опубликовано: 12 янв. 2026
Источник: debian

Описание

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wlcunfixedpackage
wlcno-dsatrixiepackage
wlcno-dsabookwormpackage
wlcno-dsabullseyepackage

Примечания

  • https://github.com/WeblateOrg/wlc/security/advisories/GHSA-9rp8-h4g8-8766

  • https://github.com/WeblateOrg/wlc/pull/1098

  • Fixed by: https://github.com/WeblateOrg/wlc/commit/aafdb507a9e66574ade1f68c50c4fe75dbe80797 (1.17.0)

Связанные уязвимости

CVSS3: 5.3
ubuntu
3 месяца назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

CVSS3: 5.3
nvd
3 месяца назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

CVSS3: 5.3
github
3 месяца назад

Weblate wlc has insecure API key configuration