CVE-2026-27839

Source
https://cve.org/CVERecord?id=CVE-2026-27839
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27839.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27839
Aliases
Published
2026-02-26T22:07:43.640Z
Modified
2026-03-01T01:34:27.498547Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
wger: IDOR in nutritional_values endpoints exposes private dietary data via direct ORM lookup
Details

wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, three nutritional_values action endpoints fetch objects via Model.objects.get(pk=pk) — a raw ORM call that bypasses the user-scoped queryset. Any authenticated user can read another user's private nutrition plan data, including caloric intake and full macro breakdown, by supplying an arbitrary PK. Commit 29876a1954fe959e4b58ef070170e81703dab60e contains a fix for the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27839.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-639"
    ]
}
References

Affected packages

Git / github.com/wger-project/wger

Affected ranges

Type
GIT
Repo
https://github.com/wger-project/wger
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*
1.0
1.0.1
1.0.2
1.0.3
1.1
1.2
1.3
1.4
1.5
1.6
1.6.1
1.7
1.8
1.9
2.*
2.0
2.2
2.3
2.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27839.json"