Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Apr 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Weblate
Weblate weblate |
|
CPEs | cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:* | |
Vendors & Products |
Weblate
Weblate weblate |
Wed, 16 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 15 Apr 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11. | |
Title | Weblate VCS credentials included in URL parameters are potentially logged and saved into browser history as plaintext | |
Weaknesses | CWE-598 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-15T20:39:09.253Z
Updated: 2025-04-16T14:49:51.412Z
Reserved: 2025-04-01T21:57:32.955Z
Link: CVE-2025-32021

Updated: 2025-04-16T14:41:15.455Z

Status : Analyzed
Published: 2025-04-15T21:16:04.523
Modified: 2025-04-30T16:11:00.570
Link: CVE-2025-32021

No data.