UBUNTU-CVE-2026-22251

Source
https://ubuntu.com/security/CVE-2026-22251
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-22251
Upstream
Downstream
Related
Published
2026-01-12T18:15:00Z
Modified
2026-01-30T21:03:29.580015Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.0, wlc supported providing unscoped API keys in the setting. This practice was discouraged for years, but the code was never removed. This might cause the API key to be leaked to different servers.

References

Affected packages

Ubuntu:Pro:18.04:LTS / wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc@0.8-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.8-1ubuntu0.1~esm1

Affected versions

0.*

0.8-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "wlc",
            "binary_version": "0.8-1ubuntu0.1~esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"

Ubuntu:Pro:20.04:LTS / wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc@1.2-1ubuntu0.20.04.1~esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2-1ubuntu0.20.04.1~esm1

Affected versions

1.*

1.1-1
1.2-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "wlc",
            "binary_version": "1.2-1ubuntu0.20.04.1~esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"

Ubuntu:Pro:22.04:LTS / wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc@1.2-1ubuntu0.22.04.1~esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2-1ubuntu0.22.04.1~esm1

Affected versions

1.*

1.2-1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "wlc",
            "binary_version": "1.2-1ubuntu0.22.04.1~esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"

Ubuntu:Pro:24.04:LTS / wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc@1.13-2ubuntu0.1~esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13-2ubuntu0.1~esm1

Affected versions

1.*

1.13-2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "wlc",
            "binary_version": "1.13-2ubuntu0.1~esm1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"

Ubuntu:25.10 / wlc

Package

Name
wlc
Purl
pkg:deb/ubuntu/wlc@1.15-2ubuntu0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.15-2ubuntu0.1

Affected versions

1.*

1.15-1
1.15-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "wlc",
            "binary_version": "1.15-2ubuntu0.1"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-22251.json"