CVE-2026-27839

wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, three `nutritional_values` action endpoints fetch objects via `Model.objects.get(pk=pk)` — a raw ORM call that bypasses the user-scoped queryset. Any authenticated user can read another user's private nutrition plan data, including caloric intake and full macro breakdown, by supplying an arbitrary PK. Commit 29876a1954fe959e4b58ef070170e81703dab60e contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wger:wger:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-26 23:16

Updated : 2026-03-03 00:49


NVD link : CVE-2026-27839

Mitre link : CVE-2026-27839

CVE.ORG link : CVE-2026-27839


JSON object : View

Products Affected

wger

  • wger
CWE
CWE-639

Authorization Bypass Through User-Controlled Key