{"id":"CVE-2026-23535","summary":"wlc Path traversal: Unsanitized API slugs in download command","details":"wlc is a Weblate command-line client using Weblate's REST API. Prior to 1.17.2, the multi-translation download could write to an arbitrary location when instructed by a crafted server. This vulnerability is fixed in 1.17.2.","aliases":["GHSA-mmwx-79f6-67jg"],"modified":"2026-04-02T13:13:05.357684Z","published":"2026-01-16T19:08:24.882Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23535.json","cwe_ids":["CWE-22"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/WeblateOrg/wlc/releases/tag/1.17.2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23535.json"},{"type":"ADVISORY","url":"https://github.com/WeblateOrg/wlc/security/advisories/GHSA-mmwx-79f6-67jg"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23535"},{"type":"FIX","url":"https://github.com/WeblateOrg/wlc/commit/216e691c6e50abae97fe2e4e4f21501bf49a585f"},{"type":"FIX","url":"https://github.com/WeblateOrg/wlc/pull/1128"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/weblateorg/wlc","events":[{"introduced":"0"},{"fixed":"4f635073a4eb9bb7bdabd3baecfce4a559dd30a6"}]}],"versions":["0.1","0.10","0.2","0.3","0.4","0.5","0.6","0.7","0.8","0.9","1.0","1.1","1.10","1.11","1.12","1.13","1.14","1.15","1.16","1.16.1","1.17.0","1.17.1","1.2","1.3","1.4","1.5","1.6","1.7","1.8","1.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23535.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H"}]}