Headline
GHSA-mmwx-79f6-67jg: Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command
Impact
Multi-translation download could write to an arbitrary location when instructed by a crafted server.
Patches
- https://github.com/WeblateOrg/wlc/pull/1128
Workarounds
Do not use wlc download with untrusted servers.
References
This issue was reported to us by wh1zee via HackerOne.
Skip to content
Navigation Menu
AI CODE CREATION
GitHub CopilotWrite better code with AI
GitHub SparkBuild and deploy intelligent apps
GitHub ModelsManage and compare prompts
MCP RegistryNewIntegrate external tools
View all features
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2026-23535
Weblate wlc path traversal vulnerability: Unsanitized API slugs in download command
High severity GitHub Reviewed Published Jan 16, 2026 in WeblateOrg/wlc • Updated Jan 16, 2026
Affected versions
< 1.17.2
Description
Published to the GitHub Advisory Database
Jan 16, 2026
Last updated
Jan 16, 2026
EPSS score