Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-42cr-w2gr-m54q | wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data |
Tue, 03 Mar 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wger
Wger wger |
|
| CPEs | cpe:2.3:a:wger:wger:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wger
Wger wger |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wger-project
Wger-project wger |
|
| Vendors & Products |
Wger-project
Wger-project wger |
Thu, 26 Feb 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wger is a free, open-source workout and fitness manager. Five routine detail action endpoints check a cache before calling `self.get_object()`. In versions up to and including 2.4, ache keys are scoped only by `pk` — no user ID is included. When a victim has previously accessed their routine via the API, an attacker can retrieve the cached response for the same PK without any ownership check. Commit e964328784e2ee2830a1991d69fadbce86ac9fbf contains a patch for the issue. | |
| Title | wger: IDOR via user-unscoped cache keys on routine API actions exposes workout data | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-03T01:37:38.975Z
Reserved: 2026-02-24T02:32:39.801Z
Link: CVE-2026-27838
Updated: 2026-03-03T01:37:34.898Z
Status : Analyzed
Published: 2026-02-26T23:16:34.963
Modified: 2026-03-03T00:50:54.890
Link: CVE-2026-27838
No data.
OpenCVE Enrichment
Updated: 2026-04-16T16:00:13Z
Github GHSA