CVE-2026-27838 PUBLISHED

wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data

Assigner: GitHub_M
Reserved: 24.02.2026 Published: 26.02.2026 Updated: 26.02.2026

wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling self.get_object(). In versions up to and including 2.4, ache keys are scoped only by pk — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 3.1

Product Status

Vendor wger-project
Product wger
Versions
  • Version <= 2.4 is affected

References

Problem Types

  • CWE-639: Authorization Bypass Through User-Controlled Key CWE