Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1132

NIXPKGS-2026-1132
published on
Permalink CVE-2026-34244
5.0 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): NONE
  • Availability impact (A): NONE
updated 8 hours ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse ignored
    8 packages
    • python314Packages.weblate-language-data
    • python313Packages.weblate-language-data
    • python314Packages.weblate-schemas
    • python312Packages.weblate-schemas
    • python314Packages.weblate-fonts
    • python313Packages.weblate-fonts
    • python313Packages.weblate-schemas
    • python312Packages.weblate-language-data
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Weblate: SSRF via Project-Level Machinery Configuration

Weblate is a web based localization tool. In versions prior to 5.17, a user with the project.edit permission (granted by the per-project "Administration" role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and reflects up to 200 characters of the response body back to the user in an error message. This constitutes a Server-Side Request Forgery (SSRF) with partial response read. This issue has been fixed in version 5.17. If developers are unable to immediately upgrade, they can limit available machinery services via WEBLATE_MACHINERY setting.

Affected products

weblate
  • ==< 517

Matching in nixpkgs

pkgs.weblate

Web based translation tool with tight version control integration

Ignored packages (8)

Package maintainers