๐Ÿ” CVE Alert

CVE-2026-43948

CRITICAL 9.9

wger: cross-tenant password reset and plaintext disclosure via gym=None bypass

CVSS Score
9.9
EPSS Score
0.0%
EPSS Percentile
0th

wger is a free, open-source workout and fitness manager. Prior to 2.6, the reset_user_password and gym_permissions_user_edit views in wger perform a gym-scope authorization check using Python object comparison (!=) that evaluates None != None as False, silently bypassing the guard when both the attacker and victim have no gym assignment (gym=None). A user with gym.manage_gym permission and gym=None can reset the password of any other gym=None user; the new plaintext password is returned verbatim in the HTML response body, enabling one-shot full account takeover. The victim's original password is invalidated, locking them out permanently. This vulnerability is fixed in 2.6.

CWE CWE-863
Vendor wger-project
Product wger
Published May 12, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for wger-project wger

Be the first to know when new critical vulnerabilities affecting wger-project wger are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

wger-project / wger
< 2.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/wger-project/wger/security/advisories/GHSA-mhc8-p3jx-84mm