Weblate Vulnerability Allows RCE via Project Backups
The National Vulnerability Database has flagged a critical flaw in Weblate, a popular web-based localization tool. Versions prior to 5.17 are susceptible to remote code execution (RCE) due to improper filtering of Git and Mercurial configuration files within project backups. While the issue is patched in version 5.17, organizations unable to update immediately can mitigate the risk by restricting access to project backups, as only users with project creation privileges can exploit this vulnerability.
The CVSS score for this vulnerability is a HIGH 8, with a vector indicating network accessibility, high privileges required, but a complex attack path. The Common Weakness Enumeration (CWE) lists this as CWE-23 (Path Traversal), CWE-94 (Code Injection), and CWE-434 (Unrestricted Upload of File with Dangerous Type), highlighting the multifaceted risk it presents.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-33435
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33435 | RCE | Weblate versions prior to 5.17 |
| CVE-2026-33435 | RCE | Weblate project backup functionality |
| CVE-2026-33435 | RCE | Unfiltered Git and Mercurial configuration files in project backup |