CVE-2026-40474
Received Received - Intake
Privilege Escalation in wger GymConfig via Missing Permission Check

Publication date: 2026-04-17

Last updated on: 2026-04-24

Assigner: GitHub, Inc.

Description
wger is a free, open-source workout and fitness manager. In versions 2.5 and below, the GymConfigUpdateView declares permission_required = 'config.change_gymconfig' but inherits WgerFormMixin instead of WgerPermissionMixin, so the permission is never enforced at runtime. Since GymConfig is an ownerless singleton, any authenticated user can modify the global gym configuration, triggering save() side effects that bulk-update user profile gym assignments β€” a vertical privilege escalation to installation-wide configuration control. This issue is fixed in version 2.5.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-17
Last Modified
2026-04-24
Generated
2026-05-07
AI Q&A
2026-04-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wger wger to 2.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in wger, a free, open-source workout and fitness manager, in versions 2.5 and below. The GymConfigUpdateView declares a permission requirement ('config.change_gymconfig') but inherits from WgerFormMixin instead of WgerPermissionMixin, which means the permission is never actually enforced at runtime.

Because GymConfig is an ownerless singleton, any authenticated user can modify the global gym configuration. This modification triggers save() side effects that bulk-update user profile gym assignments, resulting in a vertical privilege escalation that grants installation-wide configuration control to unauthorized users.

This issue is fixed in version 2.5.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows any authenticated user to modify the global gym configuration due to a missing permission enforcement, resulting in a vertical privilege escalation to installation-wide configuration control.

Such unauthorized modification of configuration and bulk updates to user profile assignments could lead to unauthorized access or changes to user data, potentially impacting the confidentiality and integrity of personal information.

Therefore, this vulnerability may negatively affect compliance with standards and regulations like GDPR and HIPAA, which require strict access controls and protection of personal data.


How can this vulnerability impact me? :

This vulnerability allows any authenticated user to gain unauthorized control over the global gym configuration in the wger application.

Such control can lead to a vertical privilege escalation, where a user with limited permissions can modify installation-wide settings, potentially affecting all users.

The bulk update of user profile gym assignments triggered by this vulnerability could disrupt user data and application behavior on a large scale.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade wger to version 2.5 or later where the issue is fixed.

Since the vulnerability allows any authenticated user to modify the global gym configuration due to missing permission enforcement, restricting user access and permissions until the upgrade is applied can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart