wlc is a Weblate command-line client using Weblate's REST API. Prior to version 2.0.0, the HTML output format in wlc embeds API response data into HTML without escaping, allowing cross-site scripting when the output is rendered in a browser. This issue has been patched in version 2.0.0.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-gx2m-mcc2-r4p3 | wlc: print_html outputs API data without HTML escaping |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weblateorg
Weblateorg wlc |
|
| Vendors & Products |
Weblateorg
Weblateorg wlc |
Fri, 08 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wlc is a Weblate command-line client using Weblate's REST API. Prior to version 2.0.0, the HTML output format in wlc embeds API response data into HTML without escaping, allowing cross-site scripting when the output is rendered in a browser. This issue has been patched in version 2.0.0. | |
| Title | wlc: print_html outputs API data without HTML escaping, enabling stored XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T03:23:12.234Z
Reserved: 2026-04-24T17:15:21.835Z
Link: CVE-2026-42150
No data.
Status : Received
Published: 2026-05-08T04:16:18.920
Modified: 2026-05-08T04:16:18.920
Link: CVE-2026-42150
No data.
OpenCVE Enrichment
Updated: 2026-05-08T07:00:03Z
Weaknesses
Github GHSA