๐Ÿ” CVE Alert

CVE-2026-27838

LOW 3.1

wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data

CVSS Score
3.1
EPSS Score
0.0%
EPSS Percentile
0th

wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling `self.get_object()`. In versions up to and including 2.4, ache keys are scoped only by `pk` โ€” no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.

CWE CWE-639
Vendor wger-project
Product wger
Published Feb 26, 2026
Last Updated Mar 3, 2026
Stay Ahead of the Next One

Get instant alerts for wger-project wger

Be the first to know when new low vulnerabilities affecting wger-project wger are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

wger-project / wger
<= 2.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/wger-project/wger/security/advisories/GHSA-42cr-w2gr-m54q github.com: https://github.com/wger-project/wger/commit/e964328784e2ee2830a1991d69fadbce86ac9fbf