UBUNTU-CVE-2026-22251

Source
https://ubuntu.com/security/CVE-2026-22251
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-22251
Upstream
Downstream
Related
Published
2026-01-12T18:15:00Z
Modified
2026-05-20T16:24:12.024428912Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

References

Affected packages

Ubuntu:25.10
wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15-2ubuntu0.1

Affected versions

1.*
1.15-1
1.15-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.15-2ubuntu0.1",
            "binary_name": "wlc"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"
Ubuntu:26.04:LTS
wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc?arch=source&distro=resolute

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.15-2
1.16.1-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.16.1-1",
            "binary_name": "wlc"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"
Ubuntu:Pro:18.04:LTS
wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc?arch=source&distro=esm-apps%2Fbionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8-1ubuntu0.1~esm1

Affected versions

0.*
0.8-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.8-1ubuntu0.1~esm1",
            "binary_name": "wlc"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"
Ubuntu:Pro:20.04:LTS
wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc?arch=source&distro=esm-apps%2Ffocal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2-1ubuntu0.20.04.1~esm1

Affected versions

1.*
1.1-1
1.2-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.2-1ubuntu0.20.04.1~esm1",
            "binary_name": "wlc"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"
Ubuntu:Pro:22.04:LTS
wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc?arch=source&distro=esm-apps%2Fjammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2-1ubuntu0.22.04.1~esm1

Affected versions

1.*
1.2-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.2-1ubuntu0.22.04.1~esm1",
            "binary_name": "wlc"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"
Ubuntu:Pro:24.04:LTS
wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc?arch=source&distro=esm-apps%2Fnoble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13-2ubuntu0.1~esm1

Affected versions

1.*
1.13-2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1.13-2ubuntu0.1~esm1",
            "binary_name": "wlc"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"