wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.
References
| Link | Resource |
|---|---|
| https://github.com/WeblateOrg/wlc/commit/216e691c6e50abae97fe2e4e4f21501bf49a585f | Patch |
| https://github.com/WeblateOrg/wlc/pull/1128 | Issue Tracking Patch |
| https://github.com/WeblateOrg/wlc/releases/tag/1.17.2 | Product Release Notes |
| https://github.com/WeblateOrg/wlc/security/advisories/GHSA-mmwx-79f6-67jg | Patch Vendor Advisory Mitigation |
Configurations
History
No history.
Information
Published : 2026-01-16 19:16
Updated : 2026-02-18 16:26
NVD link : CVE-2026-23535
Mitre link : CVE-2026-23535
CVE.ORG link : CVE-2026-23535
JSON object : View
Products Affected
weblate
- wlc
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
