Weblate, Information Disclosure, CVE-2025-XXXX (Low)

Listen to this Post

How the CVE Works

The vulnerability in Weblate (CVE-2025-XXXX) exposes users’ personal IP addresses through audit log notifications sent via email. When Weblate generates audit logs, it includes the full IP address of the user performing actions. These logs are then emailed, allowing third-party servers (such as SMTP relays or spam filters) to intercept and log the IP addresses. This unintended exposure could lead to privacy risks, as IP addresses can be used to track or identify users. The flaw was fixed in Weblate 5.12 by removing IP addresses from audit log emails.

DailyCVE Form

Platform: Weblate
Version: <5.12
Vulnerability: IP exposure
Severity: Low
Date: Jun 16, 2025

Prediction: Patch released (Weblate 5.12)

What Undercode Say

Analytics:

grep -r "audit_log_notification" /var/log/weblate/
curl -X GET http://localhost:8080/api/audit-logs/

How Exploit:

Intercept SMTP traffic to extract audit logs containing user IPs.

Protection from this CVE:

Upgrade to Weblate 5.12.

Impact:

Privacy risk via IP leakage.

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top