Vulnerability Description
Weblate is a web based localization tool. In versions prior to 5.17, the tasks API didn't verify user access for pending tasks. This could expose logs of in-progress operations to users who don't have access to given scope. The attacker needs to brute-force the random UUID of the task, so exploiting this is unlikely with the default API rate limits. This issue has been fixed in version 5.17.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Weblate | Weblate | < 5.17 |
Related Weaknesses (CWE)
References
- https://github.com/WeblateOrg/weblate/commit/4e06b12cd05d087db68384e09d5f70fe883Patch
- https://github.com/WeblateOrg/weblate/security/advisories/GHSA-vj45-x3pj-f4w4MitigationPatchVendor Advisory
FAQ
What is CVE-2026-33212?
CVE-2026-33212 is a vulnerability with a CVSS score of 3.1 (LOW). Weblate is a web based localization tool. In versions prior to 5.17, the tasks API didn't verify user access for pending tasks. This could expose logs of in-progress operations to users who don't have...
How severe is CVE-2026-33212?
CVE-2026-33212 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33212?
Check the references section above for vendor advisories and patch information. Affected products include: Weblate Weblate.