Vulnerability Description
wger is a free, open-source workout and fitness manager. Prior to 2.6, the reset_user_password and gym_permissions_user_edit views in wger perform a gym-scope authorization check using Python object comparison (!=) that evaluates None != None as False, silently bypassing the guard when both the attacker and victim have no gym assignment (gym=None). A user with gym.manage_gym permission and gym=None can reset the password of any other gym=None user; the new plaintext password is returned verbatim in the HTML response body, enabling one-shot full account takeover. The victim's original password is invalidated, locking them out permanently. This vulnerability is fixed in 2.6.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/wger-project/wger/security/advisories/GHSA-mhc8-p3jx-84mm
- https://github.com/wger-project/wger/security/advisories/GHSA-mhc8-p3jx-84mm
FAQ
What is CVE-2026-43948?
CVE-2026-43948 is a vulnerability with a CVSS score of 9.9 (CRITICAL). wger is a free, open-source workout and fitness manager. Prior to 2.6, the reset_user_password and gym_permissions_user_edit views in wger perform a gym-scope authorization check using Python object c...
How severe is CVE-2026-43948?
CVE-2026-43948 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-43948?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.