Description
wger is a free, open-source workout and fitness manager. Prior to 2.6, the reset_user_password and gym_permissions_user_edit views in wger perform a gym-scope authorization check using Python object comparison (!=) that evaluates None != None as False, silently bypassing the guard when both the attacker and victim have no gym assignment (gym=None). A user with gym.manage_gym permission and gym=None can reset the password of any other gym=None user; the new plaintext password is returned verbatim in the HTML response body, enabling one-shot full account takeover. The victim's original password is invalidated, locking them out permanently. This vulnerability is fixed in 2.6.
Problem types
CWE-863: Incorrect Authorization
Product status
References
github.com/...t/wger/security/advisories/GHSA-mhc8-p3jx-84mm
github.com/...t/wger/security/advisories/GHSA-mhc8-p3jx-84mm