CVE-2026-27835: CWE-639: Authorization Bypass Through User-Controlled Key in wger-project wger
wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, `RepetitionsConfigViewSet` and `MaxRepetitionsConfigViewSet` return all users' repetition config data because their `get_queryset()` calls `.all()` instead of filtering by the authenticated user. Any registered user can enumerate every other user's workout structure. Commit 1fda5690b35706bb137850c8a084ec6a13317b64 contains a fix for the issue.
AI Analysis
Technical Summary
CVE-2026-27835 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the wger-project's wger application, a free and open-source workout and fitness manager. In versions up to and including 2.4, the RepetitionsConfigViewSet and MaxRepetitionsConfigViewSet API endpoints improperly implement their get_queryset() methods by calling .all() on the data model, which returns all users' repetition configuration data instead of filtering the data by the authenticated user's identity. This means that any authenticated user can enumerate and retrieve workout repetition configurations belonging to other users, violating data confidentiality. The vulnerability arises because the authorization logic is missing or insufficient, allowing unauthorized data access. The issue was identified and fixed in commit 1fda5690b35706bb137850c8a084ec6a13317b64, which presumably adds proper filtering based on the authenticated user. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates the vulnerability is remotely exploitable over the network, requires low attack complexity, needs privileges (registered user), no user interaction, and impacts confidentiality only with no integrity or availability impact. No known exploits have been reported in the wild as of the publication date (February 26, 2026).
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive user data related to workout repetition configurations. Although this data may not be highly sensitive compared to financial or personal identity information, it still represents a privacy breach and could be leveraged for profiling or social engineering attacks. Organizations using wger versions up to 2.4 risk exposing user-specific workout data to any authenticated user, potentially damaging user trust and violating privacy regulations depending on jurisdiction. The vulnerability does not affect data integrity or availability, so it is less likely to cause operational disruption. However, in environments where fitness data is integrated with other personal health information, this exposure could have broader privacy implications. Since exploitation requires only a registered account, attackers can easily create accounts to access data, increasing the risk of mass data enumeration.
Mitigation Recommendations
Organizations should immediately upgrade wger to a version that includes the fix from commit 1fda5690b35706bb137850c8a084ec6a13317b64 or later. If upgrading is not immediately possible, administrators should implement temporary access controls to restrict API endpoint access to only authorized users and ensure that get_queryset() methods filter data by the authenticated user. Conduct code reviews to verify that all API endpoints enforce proper authorization checks. Additionally, monitor logs for unusual access patterns indicative of data enumeration attempts. Educate users about the importance of strong authentication and consider implementing multi-factor authentication to reduce the risk of account abuse. Finally, review privacy policies and inform users if their data may have been exposed due to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Sweden, Japan, South Korea
CVE-2026-27835: CWE-639: Authorization Bypass Through User-Controlled Key in wger-project wger
Description
wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, `RepetitionsConfigViewSet` and `MaxRepetitionsConfigViewSet` return all users' repetition config data because their `get_queryset()` calls `.all()` instead of filtering by the authenticated user. Any registered user can enumerate every other user's workout structure. Commit 1fda5690b35706bb137850c8a084ec6a13317b64 contains a fix for the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27835 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the wger-project's wger application, a free and open-source workout and fitness manager. In versions up to and including 2.4, the RepetitionsConfigViewSet and MaxRepetitionsConfigViewSet API endpoints improperly implement their get_queryset() methods by calling .all() on the data model, which returns all users' repetition configuration data instead of filtering the data by the authenticated user's identity. This means that any authenticated user can enumerate and retrieve workout repetition configurations belonging to other users, violating data confidentiality. The vulnerability arises because the authorization logic is missing or insufficient, allowing unauthorized data access. The issue was identified and fixed in commit 1fda5690b35706bb137850c8a084ec6a13317b64, which presumably adds proper filtering based on the authenticated user. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates the vulnerability is remotely exploitable over the network, requires low attack complexity, needs privileges (registered user), no user interaction, and impacts confidentiality only with no integrity or availability impact. No known exploits have been reported in the wild as of the publication date (February 26, 2026).
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive user data related to workout repetition configurations. Although this data may not be highly sensitive compared to financial or personal identity information, it still represents a privacy breach and could be leveraged for profiling or social engineering attacks. Organizations using wger versions up to 2.4 risk exposing user-specific workout data to any authenticated user, potentially damaging user trust and violating privacy regulations depending on jurisdiction. The vulnerability does not affect data integrity or availability, so it is less likely to cause operational disruption. However, in environments where fitness data is integrated with other personal health information, this exposure could have broader privacy implications. Since exploitation requires only a registered account, attackers can easily create accounts to access data, increasing the risk of mass data enumeration.
Mitigation Recommendations
Organizations should immediately upgrade wger to a version that includes the fix from commit 1fda5690b35706bb137850c8a084ec6a13317b64 or later. If upgrading is not immediately possible, administrators should implement temporary access controls to restrict API endpoint access to only authorized users and ensure that get_queryset() methods filter data by the authenticated user. Conduct code reviews to verify that all API endpoints enforce proper authorization checks. Additionally, monitor logs for unusual access patterns indicative of data enumeration attempts. Educate users about the importance of strong authentication and consider implementing multi-factor authentication to reduce the risk of account abuse. Finally, review privacy policies and inform users if their data may have been exposed due to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:32:39.800Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0c5b685912abc710cd5d6
Added to database: 2/26/2026, 10:14:14 PM
Last enriched: 3/6/2026, 9:26:58 PM
Last updated: 4/13/2026, 9:31:37 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.