Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27839: CWE-639: Authorization Bypass Through User-Controlled Key in wger-project wger

0
Medium
VulnerabilityCVE-2026-27839cvecve-2026-27839cwe-639
Published: Thu Feb 26 2026 (02/26/2026, 22:07:43 UTC)
Source: CVE Database V5
Vendor/Project: wger-project
Product: wger

Description

wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, three `nutritional_values` action endpoints fetch objects via `Model.objects.get(pk=pk)` — a raw ORM call that bypasses the user-scoped queryset. Any authenticated user can read another user's private nutrition plan data, including caloric intake and full macro breakdown, by supplying an arbitrary PK. Commit 29876a1954fe959e4b58ef070170e81703dab60e contains a fix for the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:27:26 UTC

Technical Analysis

CVE-2026-27839 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the wger-project's wger application, a free and open-source workout and fitness manager. In versions up to and including 2.4, three endpoints related to nutritional_values retrieve data using raw Django ORM calls: Model.objects.get(pk=pk). These calls bypass the intended user-scoped queryset filtering, which should restrict data access to the authenticated user's own records. Because the primary key (pk) is user-controlled and not validated against the requesting user's permissions, an authenticated attacker can supply arbitrary PK values to access other users' private nutrition plans. This includes sensitive personal health data such as caloric intake and detailed macronutrient breakdowns, which could be leveraged for privacy violations or profiling. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The flaw does not affect data integrity or availability, only confidentiality. The issue was addressed in a code commit (29876a1954fe959e4b58ef070170e81703dab60e) that presumably added proper user-scoped filtering or permission checks to these endpoints. No public exploits are known, and the CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to confidentiality impact and ease of exploitation by authenticated users.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of private user data, specifically nutrition plans containing caloric and macronutrient information. For organizations or individuals using wger to manage fitness and dietary data, this could lead to privacy breaches, loss of user trust, and potential regulatory compliance issues related to personal data protection (e.g., GDPR). While the data exposed is not directly related to financial or critical operational information, it is sensitive personal health data that could be misused for profiling or social engineering. Since exploitation requires authentication, the risk is limited to insiders or users with valid accounts, reducing the scope of impact compared to a public unauthenticated flaw. However, in environments where multiple users share the same deployment (e.g., gyms, fitness centers, or corporate wellness programs), this could allow users to spy on others’ private health data. There is no impact on data integrity or system availability, so operational disruption is unlikely. The absence of known exploits suggests limited active targeting, but the vulnerability should be remediated promptly to prevent potential abuse.

Mitigation Recommendations

Organizations using wger should immediately upgrade to a version that includes the fix from commit 29876a1954fe959e4b58ef070170e81703dab60e or later. If upgrading is not immediately possible, administrators should implement strict access controls at the application or database level to ensure users can only access their own nutrition data. This could include adding middleware or API gateway rules that enforce user-scoped filtering on all requests to nutritional_values endpoints. Code audits should be conducted to identify any other endpoints that use raw ORM calls without proper authorization checks. Logging and monitoring should be enhanced to detect unusual access patterns, such as users requesting multiple arbitrary PKs. User education about the importance of strong authentication and account security can reduce the risk of compromised accounts being used to exploit this flaw. Finally, organizations should review their privacy policies and notify affected users if unauthorized data access is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.801Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c89232ffcdb8a2524560

Added to database: 2/26/2026, 10:26:26 PM

Last enriched: 3/6/2026, 9:27:26 PM

Last updated: 4/12/2026, 1:07:16 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses