Description
wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling `self.get_object()`. In versions up to and including 2.4, ache keys are scoped only by `pk` — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.
Published: 2026-02-26
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data disclosure
Action: Apply patch
AI Analysis

Impact

The vulnerability allows an attacker to read another user's workout routines via the API when a routine has already been cached. The API checks a cache before calling get_object, but the cache keys are scoped only by the primary key, not the user ID. As a result, once a user accesses a routine, an attacker with knowledge of the primary key can retrieve the cached response without performing an ownership check. This results in unauthorized disclosure of personal fitness data, a breach of confidentiality for users of wger. The weakness maps to CWE‑639.

Affected Systems

The flaw affects the wger open-source workout manager compiled under the vendor wger‑project:wger. Versions up to and including 2.4 are impacted, as the code prior to commit e964328784e2ee2830a1991d69fadbce86ac9fbf implements the incorrect cache key. Subsequent releases containing the patch have resolved the issue.

Risk and Exploitability

With a CVSS score of 3.1 the vulnerability is classified as moderate. The EPSS score is below 1 %, indicating a very low likelihood of exploitation at present, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely exploitation path requires the attacker to know the routine’s primary key and have access to the API, either by having been authenticated or by observing an authenticated request. If the API is protected, the attacker would need to observe or obtain a valid session; if not, unauthenticated users may still be able to retrieve cached routines. In either case, the missing user ID in the cache key allows the attacker to bypass ownership checks and retrieve confidential user data.

Generated by OpenCVE AI on April 16, 2026 at 15:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the patched version of wger or apply the commit e964328784e2ee2830a1991d69fadbce86ac9fbf that scopes cache keys by user ID.
  • If an upgrade is not possible, modify the application’s caching layer to include the authenticated user’s identifier in the cache key for routine endpoints, or disable caching for these endpoints entirely.
  • Implement monitoring of routine API requests to detect repeated accesses to the same routine identifier by different user principals, and alert administrators to potential unauthorized data access.

Generated by OpenCVE AI on April 16, 2026 at 15:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-42cr-w2gr-m54q wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data
History

Tue, 03 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Wger
Wger wger
CPEs cpe:2.3:a:wger:wger:*:*:*:*:*:*:*:*
Vendors & Products Wger
Wger wger

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wger-project
Wger-project wger
Vendors & Products Wger-project
Wger-project wger

Thu, 26 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
Description wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling `self.get_object()`. In versions up to and including 2.4, ache keys are scoped only by `pk` — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.
Title wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-03T01:37:38.975Z

Reserved: 2026-02-24T02:32:39.801Z

Link: CVE-2026-27838

cve-icon Vulnrichment

Updated: 2026-03-03T01:37:34.898Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T23:16:34.963

Modified: 2026-03-03T00:50:54.890

Link: CVE-2026-27838

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:00:13Z

Weaknesses