Impact
The vulnerability is an Insecure Direct Object Reference in two API endpoints that manage repetition configuration data. The viewsets inadvertently return all users’ data instead of filtering to the authenticated account, enabling privacy violations with no code execution or privilege escalation. This issue is classified under CWE‑639.
Affected Systems
The affected product is the open‑source wger workout manager, versions up to and including 2.4. Any installation of the 2.4 branch or prior versions that had not been patched with commit 1fda5690b35706bb137850c8a084ec6a13317b64 is susceptible.
Risk and Exploitability
The CVSS score of 4.3 reflects a medium confidentiality impact, while an EPSS score of less than 1 % indicates a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker only needs a legitimate user account and can trigger the flaw by making a normal API request to the vulnerable endpoints; no special conditions are required.
OpenCVE Enrichment
Github GHSA