Upstream information
Description
Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
CNA (GitHub) | National Vulnerability Database | |
---|---|---|
Base Score | 2.2 | 7.5 |
Vector | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Attack Vector | Network | Network |
Attack Complexity | High | Low |
Privileges Required | High | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality Impact | Low | High |
Integrity Impact | None | None |
Availability Impact | None | None |
CVSSv3 Version | 3.1 | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2025:15055-1, published Wed May 7 18:50:45 2025
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2025-15055 |
SUSE Timeline for this CVE
CVE page created: Wed Apr 16 00:02:43 2025CVE page last modified: Tue Aug 5 01:27:00 2025