You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Weblate exposes personal IP address via e-mail
Low severity
GitHub Reviewed
Published
Jun 16, 2025
in
WeblateOrg/weblate
•
Updated Jul 16, 2025
The audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters.
The product does not properly prevent a person's private, personal information from being accessed by actors who either (1) are not explicitly authorized to access the information or (2) do not have the implicit consent of the person about whom the information is collected.
Learn more on MITRE.
Impact
The audit log notifications included the full IP address of the acting user. This could be obtained by third-party servers such as SMTP relays, or spam filters.
Patches
This issue has been addressed in Weblate 5.12 via WeblateOrg/weblate#15102.
References
Thanks to micael1 for reporting this issue at HackerOne.
References