Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4qqf-9m5c-w2c5

Опубликовано: 16 июн. 2025
Источник: github
Github: Прошло ревью
CVSS4: 2.1
CVSS3: 5.3

Описание

Weblate exposes personal IP address via e-mail

Impact

The audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters.

Patches

This issue has been addressed in Weblate 5.12 via https://github.com/WeblateOrg/weblate/pull/15102.

References

Thanks to micael1 for reporting this issue at HackerOne.

Пакеты

Наименование

weblate

pip
Затронутые версииВерсия исправления

< 5.12

5.12

EPSS

Процентиль: 14%
0.00046
Низкий

2.1 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-359

Связанные уязвимости

CVSS3: 5.3
nvd
8 месяцев назад

Weblate is a web based localization tool. Prior to version 5.12, the audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters. This issue has been patched in version 5.12.

CVSS3: 5.3
debian
8 месяцев назад

Weblate is a web based localization tool. Prior to version 5.12, the a ...

EPSS

Процентиль: 14%
0.00046
Низкий

2.1 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-359