Weblate ZIP Feature Exposes Systems to Symlink Traversal
The National Vulnerability Database (NVD) has flagged CVE-2026-34242, a high-severity vulnerability (CVSS 7.7) affecting Weblate, a popular web-based localization tool. Prior to version 5.17, the ZIP download functionality in Weblate failed to properly validate downloaded files. This oversight allowed for potential symlink traversal, meaning an attacker could craft a malicious ZIP archive that, when processed, would enable the application to follow symbolic links outside its intended repository.
This flaw, categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), CWE-59 (Improper Link Resolution), and CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), essentially creates a backdoor for information disclosure. An attacker with the ability to upload or influence the processing of a malicious ZIP file could potentially read sensitive files located elsewhere on the server. Weblate has addressed this critical issue in version 5.17, patching the vulnerability to ensure proper file verification during ZIP downloads.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-34242
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-34242 | Path Traversal | Weblate versions prior to 5.17 |
| CVE-2026-34242 | Path Traversal | Weblate ZIP download feature |