CVE-2026-34244: Weblate: SSRF via Project-Level Machinery Configuration
A user with the project.edit permission (granted by the per-project “Administration” role) can configure machine translation service URLs pointing to arbitrary internal network addresses. During configuration validation, Weblate makes an HTTP request to the attacker-controlled URL and reflects up to 200 characters of the response body back to the user in an error message. This constitutes a Server-Side Request Forgery (SSRF) with partial response read.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-34244 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →