wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, `RepetitionsConfigViewSet` and `MaxRepetitionsConfigViewSet` return all users' repetition config data because their `get_queryset()` calls `.all()` instead of filtering by the authenticated user. Any registered user can enumerate every other user's workout structure. Commit 1fda5690b35706bb137850c8a084ec6a13317b64 contains a fix for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/wger-project/wger/commit/1fda5690b35706bb137850c8a084ec6a13317b64 | Patch |
| https://github.com/wger-project/wger/security/advisories/GHSA-xf68-8hjw-7mpm | Exploit Vendor Advisory |
Configurations
History
03 Mar 2026, 20:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:wger:wger:*:*:*:*:*:*:*:* | |
| References | () https://github.com/wger-project/wger/commit/1fda5690b35706bb137850c8a084ec6a13317b64 - Patch | |
| References | () https://github.com/wger-project/wger/security/advisories/GHSA-xf68-8hjw-7mpm - Exploit, Vendor Advisory | |
| First Time |
Wger
Wger wger |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Feb 2026, 22:20
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-26 22:20
Updated : 2026-03-03 20:01
NVD link : CVE-2026-27835
Mitre link : CVE-2026-27835
CVE.ORG link : CVE-2026-27835
JSON object : View
Products Affected
wger
- wger
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
