Description

wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling `self.get_object()`. In versions up to and including 2.4, ache keys are scoped only by `pk` — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.

INFO

Published Date :

2026-02-26T22:04:57.968Z

Last Modified :

2026-03-03T01:37:38.975Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-27838 vulnerability.

Vendors Products
Wger
  • Wger
Wger-project
  • Wger
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-27838.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact