Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-27835
PUBLISHED
More InfoOfficial Page
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
View Known Exploited Vulnerability (KEV) details
Published At-26 Feb, 2026 | 22:00
Updated At-26 Feb, 2026 | 22:00
Rejected At-
▼CVE Numbering Authority (CNA)
wger: IDOR in RepetitionsConfig and MaxRepetitionsConfig API leak other users' workout data

wger is a free, open-source workout and fitness manager. In versions up to and including 2.4, `RepetitionsConfigViewSet` and `MaxRepetitionsConfigViewSet` return all users' repetition config data because their `get_queryset()` calls `.all()` instead of filtering by the authenticated user. Any registered user can enumerate every other user's workout structure. Commit 1fda5690b35706bb137850c8a084ec6a13317b64 contains a fix for the issue.

Affected Products
Vendor
wger-project
Product
wger
Versions
Affected
  • <= 2.4
Problem Types
TypeCWE IDDescription
CWECWE-639CWE-639: Authorization Bypass Through User-Controlled Key
Type: CWE
CWE ID: CWE-639
Description: CWE-639: Authorization Bypass Through User-Controlled Key
Metrics
VersionBase scoreBase severityVector
3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/wger-project/wger/security/advisories/GHSA-xf68-8hjw-7mpm
x_refsource_CONFIRM
https://github.com/wger-project/wger/commit/1fda5690b35706bb137850c8a084ec6a13317b64
x_refsource_MISC
Hyperlink: https://github.com/wger-project/wger/security/advisories/GHSA-xf68-8hjw-7mpm
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/wger-project/wger/commit/1fda5690b35706bb137850c8a084ec6a13317b64
Resource:
x_refsource_MISC
Details not found