CVE-2026-34393
Received Received - Intake
Improper Access Control in Weblate User Patching API Prior to

Publication date: 2026-04-15

Last updated on: 2026-04-21

Assigner: GitHub, Inc.

Description
Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-21
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
weblate weblate to 5.17 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-34393 is a high-severity privilege escalation vulnerability in Weblate versions prior to 5.17. It affects the user patching API endpoint, which did not properly restrict the scope of user edits. This flaw allows an attacker with low privileges to escalate their access rights.

The vulnerability can be exploited remotely over the network without any user interaction and impacts confidentiality, integrity, and availability at a high level. It is caused by improper privilege management where the system fails to correctly assign or verify user privileges, resulting in unauthorized control.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with limited privileges to escalate their access within the Weblate system, potentially gaining unauthorized control over user, group, and comment data.

Such unauthorized access can compromise the confidentiality, integrity, and availability of the system, leading to data breaches, unauthorized modifications, or denial of service.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects the user patching API endpoint in Weblate versions prior to 5.17, where improper privilege management allows unauthorized edits. Detection involves identifying if your Weblate instance is running a vulnerable version and monitoring API usage for unauthorized user patch requests.

You can check the Weblate version by running a command on the server hosting Weblate, for example:

  • Check Weblate version: `weblate --version` or inspect the version in the Weblate UI or deployment configuration.

To detect exploitation attempts, monitor API logs for PATCH or PUT requests to the user patching endpoint that modify fields beyond the allowed scope for low-privilege users.

  • Example command to search logs for suspicious user patch requests (assuming logs are in `/var/log/weblate/api.log`): `grep -i "PATCH /api/users/" /var/log/weblate/api.log | grep -v "allowed_fields"`

Additionally, network monitoring tools can be used to detect unusual API calls from low-privilege accounts attempting to escalate privileges.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade Weblate to version 5.17 or later, where the vulnerability has been fixed by enforcing stricter permission checks on the user patching API endpoint.

  • Upgrade Weblate to version 5.17 or newer.

If immediate upgrade is not possible, restrict access to the Weblate API endpoints to trusted users only and monitor API usage closely for suspicious activity.

  • Restrict network access to the Weblate API.
  • Implement logging and alerting on user patch API calls.

Review and tighten user permissions to ensure that low-privilege users cannot perform unauthorized edits until the patch is applied.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-34393 is a high-severity privilege escalation vulnerability that impacts confidentiality, integrity, and availability at a high level by allowing unauthorized users to escalate their privileges and modify user, group, and comment data via the Weblate API.

Such unauthorized access and modification of user data can lead to violations of data protection and privacy requirements found in common standards and regulations like GDPR and HIPAA, which mandate strict controls over access to personal and sensitive information.

Therefore, until patched, this vulnerability could compromise compliance by enabling improper privilege management and unauthorized data changes, potentially exposing sensitive information or disrupting system availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart