CVE-2025-67492
📋 TL;DR
This vulnerability in Weblate allows attackers to trigger excessive repository updates via malicious webhook payloads, potentially causing denial of service through resource exhaustion. It affects all Weblate instances with webhooks enabled prior to version 5.15. Organizations using Weblate for localization management are impacted.
💻 Affected Systems
- Weblate
📦 What is this software?
Weblate by Weblate
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption through resource exhaustion, overwhelming system resources with simultaneous repository updates, potentially causing extended downtime.
Likely Case
Degraded performance and intermittent service interruptions as system resources are consumed by excessive repository update operations.
If Mitigated
Minimal impact with proper rate limiting and monitoring in place, though some performance degradation may still occur during attack attempts.
🎯 Exploit Status
Exploitation requires ability to send crafted webhook payloads to vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.15
Vendor Advisory: https://github.com/WeblateOrg/weblate/security/advisories/GHSA-pj86-258h-qrvf
Restart Required: Yes
Instructions:
1. Backup your Weblate instance and database. 2. Update Weblate to version 5.15 or later using your package manager or pip. 3. Restart the Weblate service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Disable Webhooks
allCompletely disable webhook functionality to prevent exploitation
Set ENABLE_HOOKS = False in your settings.py or environment variables
🧯 If You Can't Patch
- Implement strict rate limiting on webhook endpoints
- Deploy WAF rules to detect and block malicious webhook payload patterns
🔍 How to Verify
Check if Vulnerable:
Check Weblate version: if version < 5.15 and webhooks are enabled, system is vulnerable.
Check Version:
weblate --version or check Weblate web interface admin panel
Verify Fix Applied:
Verify Weblate version is 5.15 or higher and test webhook functionality remains operational.
📡 Detection & Monitoring
Log Indicators:
- Multiple repository update operations triggered in rapid succession
- Unusual webhook activity patterns
- Resource exhaustion warnings in system logs
Network Indicators:
- High volume of webhook requests to Weblate endpoints
- Unusual payload patterns in webhook traffic
SIEM Query:
source="weblate" AND ("repository update" OR "webhook") | stats count by src_ip, user_agent | where count > threshold