{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-24126","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-21T18:38:22.473Z","datePublished":"2026-02-18T23:05:03.478Z","dateUpdated":"2026-02-19T17:13:53.353Z"},"containers":{"cna":{"title":"Weblate has an argument injection in management console","problemTypes":[{"descriptions":[{"cweId":"CWE-88","lang":"en","description":"CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/WeblateOrg/weblate/security/advisories/GHSA-33fm-6gp7-4p47","tags":["x_refsource_CONFIRM"],"url":"https://github.com/WeblateOrg/weblate/security/advisories/GHSA-33fm-6gp7-4p47"},{"name":"https://github.com/WeblateOrg/weblate/pull/17722","tags":["x_refsource_MISC"],"url":"https://github.com/WeblateOrg/weblate/pull/17722"},{"name":"https://github.com/WeblateOrg/weblate/commit/78773cc141ce0a97900c11341e6cf856451395fd","tags":["x_refsource_MISC"],"url":"https://github.com/WeblateOrg/weblate/commit/78773cc141ce0a97900c11341e6cf856451395fd"}],"affected":[{"vendor":"WeblateOrg","product":"weblate","versions":[{"version":"< 5.16.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-18T23:05:03.478Z"},"descriptions":[{"lang":"en","value":"Weblate is a web based localization tool. Prior to 5.16.0, the SSH management console did not validate the passed input while adding the SSH host key, which could lead to an argument injection to `ssh-add`. Version 5.16.0 fixes the issue. As a workaround, properly limit access to the management console."}],"source":{"advisory":"GHSA-33fm-6gp7-4p47","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-19T17:13:05.858607Z","id":"CVE-2026-24126","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-19T17:13:53.353Z"}}]}}