We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49134

Weblate exposes personal IP address via e-mail



Description

Weblate is a web based localization tool. Prior to version 5.12, the audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters. This issue has been patched in version 5.12.

Reserved 2025-06-02 | Published 2025-06-16 | Updated 2025-06-16 | Assigner GitHub_M


LOW: 2.1CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-359: Exposure of Private Personal Information to an Unauthorized Actor

Product status

< 5.12
affected

References

github.com/...eblate/security/advisories/GHSA-4qqf-9m5c-w2c5

github.com/WeblateOrg/weblate/pull/15102

github.com/...ommit/020b2905e4d001cff2452574d10e6cf3621b5f62

github.com/WeblateOrg/weblate/releases/tag/weblate-5.12.1

cve.org (CVE-2025-49134)

nvd.nist.gov (CVE-2025-49134)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49134

Support options

Helpdesk Chat, Email, Knowledgebase