Home

Description

Weblate is a web based localization tool. Prior to version 5.17.1, an authenticated user with project.add permission (default on hosted Weblate SaaS and for any user holding an active billing/trial plan) can import a crafted project backup ZIP whose components/<name>.json contains an attacker-chosen repo URL pointing at a private address (e.g. http://127.0.0.1:9999/) or using a non-allow-listed scheme (e.g. file://, git://). Weblate persists the component via Component.objects.bulk_create([component])[0], which bypasses Django's full_clean() and therefore never runs the validate_repo_url validator. The URL is subsequently written verbatim into .git/config by configure_repo(pull=False). This issue has been patched in version 5.17.1.

PUBLISHED Reserved 2026-04-21 | Published 2026-05-07 | Updated 2026-05-08 | Assigner GitHub_M




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-20: Improper Input Validation

CWE-918: Server-Side Request Forgery (SSRF)

Product status

< 5.17.1
affected

References

github.com/...eblate/security/advisories/GHSA-cwcx-382v-8m9g

github.com/WeblateOrg/weblate/pull/19061

github.com/WeblateOrg/weblate/pull/19062

github.com/...ommit/e1eff1f517c1ee315d69581910baaabb724e5ef0

github.com/...ommit/e4b67a76d95d5165ecb9937f7485fd79223b7f14

github.com/WeblateOrg/weblate/releases/tag/weblate-5.17.1

cve.org (CVE-2026-41654)

nvd.nist.gov (CVE-2026-41654)

Download JSON