Published issues
Permalink
CVE-2026-33472
4.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): LOW
-
User interaction (UI): REQUIRED
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
package cryptomator-cli
1 week, 5 days ago
-
@LeSuisse
ignored
2 maintainers
1 week, 5 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
Cryptomator Hub OAuth token exchange HTTP downgrade via getAuthority() scheme confusion (CVE-2026-32303 bypass)
Cryptomator is an open-source client-side encryption application for cloud storage. Version 1.19.1 contains a logic flaw in CheckHostTrustController.getAuthority() that allows an attacker to bypass the security fix for CVE-2026-32303. The method hardcodes the URI scheme based on port number, causing HTTPS URLs with port 80 to produce the same authority string as HTTP URLs, which defeats both the consistency check and the HTTP block validation. An attacker with write access to a cloud-synced vault.cryptomator file can craft a Hub configuration where apiBaseUrl and authEndpoint use HTTPS with port 80 to pass auto-trust validation, while tokenEndpoint uses plaintext HTTP. The vault is auto-trusted without user prompt, and a network-positioned attacker can intercept the OAuth token exchange to access the Cryptomator Hub API as the victim. This issue has been fixed in version 1.19.2.
Matching in nixpkgs
Free client-side encryption for your cloud files
Ignored packages (1)
Command line program to access encrypted Cryptomator vaults
Package maintainers
Ignored maintainers (2)
Permalink
CVE-2026-40960
8.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): LOCAL
-
Attack complexity (AC): HIGH
-
Privileges required (PR): NONE
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 5 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 5 days ago
-
@LeSuisse
ignored
2 packages
- luanti-client
- luanti-server
1 week, 5 days ago
-
@LeSuisse
ignored
3 maintainers
1 week, 5 days ago
maintainer.ignore
-
@LeSuisse
accepted
1 week, 5 days ago
-
@LeSuisse
published on GitHub
1 week, 5 days ago
Luanti 5 before 5.15.2 sometimes allows unintended access to an …
Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least one mod is listed as secure.trusted_mods or secure.http_mods, then a crafted mod can intercept the request for the insecure environment or HTTP API, and also receive access to it.
Matching in nixpkgs
Open source voxel game engine (formerly Minetest)
Ignored packages (2)
Open source voxel game engine (formerly Minetest)
Open source voxel game engine (formerly Minetest)
Package maintainers
Ignored maintainers (3)
Permalink
CVE-2026-33214
4.3 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): NONE
-
Integrity impact (I): LOW
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python313Packages.weblate-fonts
- python314Packages.weblate-fonts
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate has improper access control for the translation memory API
Weblate is a web based localization tool. In versions prior to 5.17, the translation memory API exposed unintended endpoints, which in turn didn't enforce proper access control. This issue has been fixed in version 5.17. If users are unable to update immediately, they can work around this issue by blocking access to /api/memory/ in the HTTP server, which removes access to this feature.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-33220
6.8 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): REQUIRED
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python313Packages.weblate-fonts
- python314Packages.weblate-fonts
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: JavaScript localization CDN add-on allows arbitrary local file read outside the repository
Weblate is a web based localization tool. In versions prior to 5.17, the translation memory API exposed unintended endpoints, which in turn didn't perform proper access control. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can disable this feature as the CDN add-on is not enabled by default.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-40256
5.0 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python313Packages.weblate-fonts
- python314Packages.weblate-fonts
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: Prefix-Based Repository Boundary Check Bypass via Symlink/Junction Path Prefix Collision
Weblate is a web based localization tool. In versions prior to 5.17, repository-boundary validation relies on string prefix checks on resolved absolute paths. In multiple code paths, the check uses startswith against the repository root path. This is not path-segment aware and can be bypassed when the external path shares the same string prefix as the repository path (for example, repo and repo_outside). This issue has been fixed in version 5.17.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-33440
5.0 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python313Packages.weblate-fonts
- python314Packages.weblate-fonts
- python312Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: Authenticated SSRF via redirect bypass of ALLOWED_ASSET_DOMAINS in screenshot URL uploads
Weblate is a web based localization tool. In versions prior to 5.17, the ALLOWED_ASSET_DOMAINS setting applied only to the first issued requests and didn't restrict possible redirects. This issue has been fixed in version 5.17.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-33435
8.1 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): HIGH
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python314Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-schemas
- python312Packages.weblate-schemas
- python314Packages.weblate-fonts
- python313Packages.weblate-fonts
- python312Packages.weblate-language-data
- python313Packages.weblate-schemas
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: Remote code execution during backup restoration
Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can limit the scope of the vulnerability by restricting access to the project backup, as it is only accessible to users who can create projects.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-34244
5.0 MEDIUM
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): CHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python314Packages.weblate-language-data
- python313Packages.weblate-language-data
- python314Packages.weblate-schemas
- python312Packages.weblate-schemas
- python314Packages.weblate-fonts
- python313Packages.weblate-fonts
- python313Packages.weblate-schemas
- python312Packages.weblate-language-data
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: SSRF via Project-Level Machinery Configuration
Weblate is a web based localization tool. In versions prior to 5.17, a user with the project.edit permission (granted by the per-project "Administration" role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and reflects up to 200 characters of the response body back to the user in an error message. This constitutes a Server-Side Request Forgery (SSRF) with partial response read. This issue has been fixed in version 5.17. If developers are unable to immediately upgrade, they can limit available machinery services via WEBLATE_MACHINERY setting.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-34393
8.8 HIGH
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): LOW
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): HIGH
-
Integrity impact (I): HIGH
-
Availability impact (A): HIGH
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python313Packages.weblate-fonts
- python312Packages.weblate-schemas
- python314Packages.weblate-schemas
- python312Packages.weblate-language-data
- python314Packages.weblate-language-data
- python313Packages.weblate-language-data
- python313Packages.weblate-schemas
- python314Packages.weblate-fonts
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: Privilege escalation in the user API endpoint
Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate
Permalink
CVE-2026-33212
3.1 LOW
-
CVSS version: 3.1
-
Attack vector (AV): NETWORK
-
Attack complexity (AC): HIGH
-
Privileges required (PR): LOW
-
User interaction (UI): NONE
-
Scope (S): UNCHANGED
-
Confidentiality impact (C): LOW
-
Integrity impact (I): NONE
-
Availability impact (A): NONE
updated
1 week, 6 days ago
by @LeSuisse
Activity log
-
Created suggestion
1 week, 6 days ago
-
@LeSuisse
ignored
8 packages
- python314Packages.weblate-language-data
- python313Packages.weblate-language-data
- python312Packages.weblate-language-data
- python314Packages.weblate-schemas
- python313Packages.weblate-schemas
- python314Packages.weblate-fonts
- python313Packages.weblate-fonts
- python312Packages.weblate-schemas
1 week, 6 days ago
-
@LeSuisse
accepted
1 week, 6 days ago
-
@LeSuisse
published on GitHub
1 week, 6 days ago
Weblate: Improper access control for pending tasks in API
Weblate is a web based localization tool. In versions prior to 5.17, the tasks API didn't verify user access for pending tasks. This could expose logs of in-progress operations to users who don't have access to given scope. The attacker needs to brute-force the random UUID of the task, so exploiting this is unlikely with the default API rate limits. This issue has been fixed in version 5.17.
Matching in nixpkgs
Web based translation tool with tight version control integration
Ignored packages (8)
Language definitions used by Weblate
Language definitions used by Weblate
Language definitions used by Weblate