Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-23535

Опубликовано: 16 янв. 2026
Источник: debian

Описание

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wlcunfixedpackage
wlcno-dsatrixiepackage
wlcno-dsabookwormpackage
wlcno-dsabullseyepackage

Примечания

  • https://github.com/WeblateOrg/wlc/security/advisories/GHSA-mmwx-79f6-67jg

  • https://github.com/WeblateOrg/wlc/pull/1128

  • Fixed by: https://github.com/WeblateOrg/wlc/commit/216e691c6e50abae97fe2e4e4f21501bf49a585f (1.17.2)

Связанные уязвимости

CVSS3: 8
ubuntu
22 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
nvd
22 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
github
22 дня назад

Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command