CVE-2026-23535

Source
https://nvd.nist.gov/vuln/detail/CVE-2026-23535
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23535.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23535
Aliases
Downstream
Published
2026-01-16T19:08:24.882Z
Modified
2026-01-18T03:46:20.958405Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
wlc Path traversal: Unsanitized API slugs in download command
Details

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23535.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/weblateorg/wlc

Affected ranges

Type
GIT
Repo
https://github.com/weblateorg/wlc
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1
0.10
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9

1.*

1.0
1.1
1.10
1.11
1.12
1.13
1.14
1.15
1.16
1.16.1
1.17.0
1.17.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23535.json"