Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22251

Опубликовано: 12 янв. 2026
Источник: debian
EPSS Низкий

Описание

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wlcunfixedpackage
wlcno-dsatrixiepackage
wlcno-dsabookwormpackage

Примечания

  • https://github.com/WeblateOrg/wlc/security/advisories/GHSA-9rp8-h4g8-8766

  • https://github.com/WeblateOrg/wlc/pull/1098

  • Fixed by: https://github.com/WeblateOrg/wlc/commit/aafdb507a9e66574ade1f68c50c4fe75dbe80797 (1.17.0)

EPSS

Процентиль: 1%
0.00011
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
8 дней назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

CVSS3: 5.3
nvd
8 дней назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

CVSS3: 5.3
github
8 дней назад

Weblate wlc has insecure API key configuration

EPSS

Процентиль: 1%
0.00011
Низкий