CVE-2026-27838

Source
https://cve.org/CVERecord?id=CVE-2026-27838
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27838.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27838
Aliases
Published
2026-02-26T22:04:57.968Z
Modified
2026-03-01T01:34:30.361600Z
Severity
  • 3.1 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data
Details

wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling self.get_object(). In versions up to and including 2.4, ache keys are scoped only by pk — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue.

Database specific
{
    "cwe_ids": [
        "CWE-639"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27838.json"
}
References

Affected packages

Git / github.com/wger-project/wger

Affected ranges

Type
GIT
Repo
https://github.com/wger-project/wger
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0
1.0.1
1.0.2
1.0.3
1.1
1.2
1.3
1.4
1.5
1.6
1.6.1
1.7
1.8
1.9
2.*
2.0
2.2
2.3
2.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27838.json"