Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mmwx-79f6-67jg

Опубликовано: 16 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 8

Описание

Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command

Impact

Multi-translation download could write to an arbitrary location when instructed by a crafted server.

Patches

Workarounds

Do not use wlc download with untrusted servers.

References

This issue was reported to us by wh1zee via HackerOne.

Пакеты

Наименование

wlc

pip
Затронутые версииВерсия исправления

< 1.17.2

1.17.2

EPSS

Процентиль: 9%
0.00033
Низкий

8 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 8
ubuntu
22 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
nvd
22 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

CVSS3: 8
debian
22 дня назад

wlc is a Weblate command-line client using Weblate's REST API. Prior t ...

EPSS

Процентиль: 9%
0.00033
Низкий

8 High

CVSS3

Дефекты

CWE-22