CVE-2025-32021
Python vulnerability analysis and mitigation

Overview

Weblate, a web-based localization tool, was found to have a security vulnerability (CVE-2025-32021) prior to version 5.11. When creating a new component from an existing component with a source code repository URL in settings, the URL containing sensitive credentials was exposed in client's URL parameters. This vulnerability was discovered and disclosed in April 2025, affecting all Weblate installations before version 5.11, particularly those using the official Docker image (GitHub Advisory).

Technical details

The vulnerability occurs during the component creation process where repository URLs, including GitHub credentials such as Personal Access Tokens (PAT) and usernames, are exposed in plaintext within URL parameters. The problematic URL follows the pattern: https:///create/component/vcs/?repo=https%3A%2F%2F%3A%40github.com%2F%2F.git. The issue has a CVSS v3.1 score of 2.2 (Low) with the vector string CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N, and is classified as CWE-598 (Use of GET Request Method With Sensitive Query Strings) (GitHub Advisory, NVD).

Impact

The exposure of credentials in plaintext could lead to unauthorized access to private repositories containing sensitive source code. The vulnerability is particularly concerning as the credentials are saved in browser history and server logs. Browser extensions with history access permissions could potentially extract these credentials, providing an attack vector for unauthorized repository access (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Weblate version 5.11. Users are advised to upgrade to this version or later to address the security issue. The fix prevents the exposure of sensitive credentials in URL parameters and logs (GitHub Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management