Home

Description

wger is a free, open-source workout and fitness manager. Prior to 2.6, the reset_user_password and gym_permissions_user_edit views in wger perform a gym-scope authorization check using Python object comparison (!=) that evaluates None != None as False, silently bypassing the guard when both the attacker and victim have no gym assignment (gym=None). A user with gym.manage_gym permission and gym=None can reset the password of any other gym=None user; the new plaintext password is returned verbatim in the HTML response body, enabling one-shot full account takeover. The victim's original password is invalidated, locking them out permanently. This vulnerability is fixed in 2.6.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-12 | Updated 2026-05-13 | Assigner GitHub_M




CRITICAL: 9.9CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-863: Incorrect Authorization

Product status

< 2.6
affected

References

github.com/...t/wger/security/advisories/GHSA-mhc8-p3jx-84mm exploit

github.com/...t/wger/security/advisories/GHSA-mhc8-p3jx-84mm

cve.org (CVE-2026-43948)

nvd.nist.gov (CVE-2026-43948)

Download JSON