Cyber Posture

CVE-2026-34393

High

Published: 15 April 2026

Published
15 April 2026
Modified
21 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-34393 is a high-severity Improper Privilege Management (CWE-269) vulnerability in Weblate Weblate. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 2.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly mitigating the failure to limit edit scope in the user patching API endpoint.

prevent

Employs least privilege to restrict low-privileged users from performing edits beyond their authorized scope, addressing the improper privilege management flaw.

prevent

Validates inputs to the patching API endpoint to ensure edit scopes align with user privileges, providing an additional layer against unauthorized modifications.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

The improper privilege management flaw in the user patching API endpoint allows low-privileged authenticated users to perform unauthorized edits, directly enabling exploitation for privilege escalation (T1068) and account manipulation (T1098).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.

Deeper analysisAI

CVE-2026-34393 is a vulnerability in Weblate, a web-based localization tool, affecting versions prior to 5.17. The issue lies in the user patching API endpoint, which fails to properly limit the scope of edits. This improper privilege management flaw, mapped to CWE-269, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

The vulnerability can be exploited by a low-privileged authenticated user (PR:L) over the network (AV:N) with low attack complexity and no user interaction required. Exploitation allows the attacker to perform edits beyond their authorized scope, resulting in high impacts on confidentiality, integrity, and availability.

Weblate has addressed this issue in version 5.17. Additional details are available in the GitHub security advisory at https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3382-gw9x-477v and the fixing pull request at https://github.com/WeblateOrg/weblate/pull/18687.

Details

CWE(s)

Affected Products

weblate
weblate
≤ 5.17

CVEs Like This One

CVE-2026-33435Same product: Weblate Weblate
CVE-2026-21889Same product: Weblate Weblate
CVE-2025-68398Same product: Weblate Weblate
CVE-2026-24126Same product: Weblate Weblate
CVE-2026-34242Same product: Weblate Weblate
CVE-2025-40538Shared CWE-269
CVE-2026-7106Shared CWE-269
CVE-2026-1994Shared CWE-269
CVE-2026-2931Shared CWE-269
CVE-2024-50619Shared CWE-269

References