CVE-2026-40474
Privilege Escalation in wger GymConfig via Missing Permission Check
Publication date: 2026-04-17
Last updated on: 2026-04-24
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wger | wger | to 2.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in wger, a free, open-source workout and fitness manager, in versions 2.5 and below. The GymConfigUpdateView declares a permission requirement ('config.change_gymconfig') but inherits from WgerFormMixin instead of WgerPermissionMixin, which means the permission is never actually enforced at runtime.
Because GymConfig is an ownerless singleton, any authenticated user can modify the global gym configuration. This modification triggers save() side effects that bulk-update user profile gym assignments, resulting in a vertical privilege escalation that grants installation-wide configuration control to unauthorized users.
This issue is fixed in version 2.5.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows any authenticated user to modify the global gym configuration due to a missing permission enforcement, resulting in a vertical privilege escalation to installation-wide configuration control.
Such unauthorized modification of configuration and bulk updates to user profile assignments could lead to unauthorized access or changes to user data, potentially impacting the confidentiality and integrity of personal information.
Therefore, this vulnerability may negatively affect compliance with standards and regulations like GDPR and HIPAA, which require strict access controls and protection of personal data.
How can this vulnerability impact me? :
This vulnerability allows any authenticated user to gain unauthorized control over the global gym configuration in the wger application.
Such control can lead to a vertical privilege escalation, where a user with limited permissions can modify installation-wide settings, potentially affecting all users.
The bulk update of user profile gym assignments triggered by this vulnerability could disrupt user data and application behavior on a large scale.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade wger to version 2.5 or later where the issue is fixed.
Since the vulnerability allows any authenticated user to modify the global gym configuration due to missing permission enforcement, restricting user access and permissions until the upgrade is applied can help reduce risk.