Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-27457
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-26 Feb, 2026 | 22:20
Updated At-27 Feb, 2026 | 17:05

Weblate is a web based localization tool. Prior to version 5.16.1, the REST API's `AddonViewSet` (`weblate/api/views.py`, line 2831) uses `queryset = Addon.objects.all()` without overriding `get_queryset()` to scope results by user permissions. This allows any authenticated user (or anonymous users if `REQUIRE_LOGIN` is not set) to list and retrieve ALL addons across all projects and components via `GET /api/addons/` and `GET /api/addons/{id}/`. Version 5.16.1 fixes the issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CPE Matches

weblate
weblate
>>weblate>>Versions before 5.16.1(exclusive)
cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarysecurity-advisories@github.com
CWE-862Primarysecurity-advisories@github.com
CWE-862Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-862
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-862
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/WeblateOrg/weblate/commit/3f58f9a4152bc0cbdd6eff5954f9c7bc4d9f0af9security-advisories@github.com
Patch
https://github.com/WeblateOrg/weblate/commit/7802c9b121eb407c48d4adddd4f2458fb3efef0fsecurity-advisories@github.com
Patch
https://github.com/WeblateOrg/weblate/pull/18107security-advisories@github.com
Issue Tracking
Patch
https://github.com/WeblateOrg/weblate/pull/18164security-advisories@github.com
Issue Tracking
Patch
https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.16.1security-advisories@github.com
Product
Release Notes
https://github.com/WeblateOrg/weblate/security/advisories/GHSA-wppc-7cq7-cgfvsecurity-advisories@github.com
Patch
Vendor Advisory
Hyperlink: https://github.com/WeblateOrg/weblate/commit/3f58f9a4152bc0cbdd6eff5954f9c7bc4d9f0af9
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/WeblateOrg/weblate/commit/7802c9b121eb407c48d4adddd4f2458fb3efef0f
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/WeblateOrg/weblate/pull/18107
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/WeblateOrg/weblate/pull/18164
Source: security-advisories@github.com
Resource:
Issue Tracking
Patch
Hyperlink: https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.16.1
Source: security-advisories@github.com
Resource:
Product
Release Notes
Hyperlink: https://github.com/WeblateOrg/weblate/security/advisories/GHSA-wppc-7cq7-cgfv
Source: security-advisories@github.com
Resource:
Patch
Vendor Advisory
Change History
0Changes found

Details not found