CVE-2026-43948: wger Workout Manager Critical Account Takeover
The National Vulnerability Database has detailed CVE-2026-43948, a critical vulnerability in wger, an open-source workout and fitness manager. Versions prior to 2.6 are affected. The flaw resides in the reset_user_password and gym_permissions_user_edit views. A logical error in the gym-scope authorization check allows an attacker to bypass the guard when both the attacker and victim are not assigned to any gym (gym=None).
Specifically, a user with gym.manage_gym permission and gym=None can reset the password of any other gym=None user. The new plaintext password is then returned directly in the HTML response, granting immediate and full account takeover. This action also invalidates the victim’s original password, effectively locking them out permanently. The National Vulnerability Database rates this with a CVSS score of 9.9 (CRITICAL).
This is a straight-up account takeover, no fancy footwork required. The fix is available in wger version 2.6. Organizations using wger must prioritize this patch. Attackers will scan for gym=None users and leverage this simple authentication bypass for quick account compromise.
What This Means For You
- If your organization uses wger, immediately confirm your version. If it's prior to 2.6, patch to 2.6 or higher RIGHT NOW. Audit user accounts to identify any with `gym=None` assignments, as these are directly exposed. Any `gym.manage_gym` user with `gym=None` could be an attacker, or their account could be leveraged.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-43948: wger Password Reset Account Takeover
title: CVE-2026-43948: wger Password Reset Account Takeover
id: scw-2026-05-12-ai-1
status: experimental
level: critical
description: |
Detects the specific password reset mechanism in wger (CVE-2026-43948) where a user with 'gym.manage_gym' permission and no gym assignment (gym=None) can reset the password of any other user with gym=None. The detection looks for POST requests to the password reset endpoint with a query parameter indicating a gym=None context, which is characteristic of the vulnerability exploitation. The plaintext password returned in the HTML response (status 200) enables account takeover.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43948/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/password/reset/'
cs-method:
- 'POST'
sc-status:
- '200'
selection_payload:
cs-uri-query|contains:
- 'gym=None'
condition: selection AND selection_payload
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43948 | Auth Bypass | wger workout and fitness manager versions prior to 2.6 |
| CVE-2026-43948 | Account Takeover | wger vulnerable views: reset_user_password, gym_permissions_user_edit |
| CVE-2026-43948 | Information Disclosure | wger plaintext password returned in HTML response body |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 13, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.