logo

CVE-2025-49134 weblate

Package

Manager: pip
Name: weblate
Vulnerable Version: >=0 <5.12

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N

EPSS: 0.00048 pctl0.1434

Details

Weblate exposes personal IP address via e-mail ### Impact The audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters. ### Patches This issue has been addressed in Weblate 5.12 via https://github.com/WeblateOrg/weblate/pull/15102. ### References Thanks to [micael1](https://hackerone.com/micael1) for reporting this [issue at HackerOne](https://hackerone.com/reports/3179850).

Metadata

Created: 2025-06-16T14:52:56Z
Modified: 2025-07-16T21:03:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-4qqf-9m5c-w2c5/GHSA-4qqf-9m5c-w2c5.json
CWE IDs: ["CWE-359"]
Alternative ID: GHSA-4qqf-9m5c-w2c5
Finding: F038
Auto approve: 1