Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22251

Опубликовано: 12 янв. 2026
Источник: debian
EPSS Низкий

Описание

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wlcunfixedpackage
wlcno-dsatrixiepackage
wlcno-dsabookwormpackage
wlcno-dsabullseyepackage

Примечания

  • https://github.com/WeblateOrg/wlc/security/advisories/GHSA-9rp8-h4g8-8766

  • https://github.com/WeblateOrg/wlc/pull/1098

  • Fixed by: https://github.com/WeblateOrg/wlc/commit/aafdb507a9e66574ade1f68c50c4fe75dbe80797 (1.17.0)

EPSS

Процентиль: 1%
0.00011
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
27 дней назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

CVSS3: 5.3
nvd
27 дней назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

CVSS3: 5.3
github
27 дней назад

Weblate wlc has insecure API key configuration

EPSS

Процентиль: 1%
0.00011
Низкий