VYPR
High severityNVD Advisory· Published Aug 8, 2023· Updated Oct 10, 2024

CVE-2023-38759

CVE-2023-38759

Description

Cross Site Request Forgery (CSRF) vulnerability in wger Project wger Workout Manager 2.2.0a3 allows a remote attacker to gain privileges via the user-management feature in the gym/views/gym.py, templates/gym/reset_user_password.html, templates/user/overview.html, core/views/user.py, and templates/user/preferences.html, core/forms.py components.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSRF vulnerability in wger Workout Manager 2.2.0a3 allows remote attackers to gain privileges via email change and password reset without proper CSRF protection.

Vulnerability

Overview

CVE-2023-38759 is a Cross-Site Request Forgery (CSRF) vulnerability in wger Workout Manager version 2.2.0a3. The application fails to include CSRF tokens in user-management forms, specifically in the gym/views/gym.py, core/views/user.py, and related templates. This allows an attacker to craft malicious requests that execute unauthorized actions on behalf of an authenticated user.[1][2]

Exploitation

An attacker can exploit this by tricking a logged-in user into visiting a crafted web page or clicking a malicious link. The vulnerable endpoints include /en/user/preferences, /en/gym/user/1/reset-user-password, and /en/user/password/reset/. No authentication other than the victim's existing session is required for the attacker to initiate the requests.[2]

Impact

Successful exploitation enables the attacker to change the victim's email address or reset their password, leading to full account compromise. The attacker can then exfiltrate sensitive data associated with the compromised account, such as workout logs, nutrition plans, and personal information.[2][4] This can result in privilege escalation within the application.

Mitigation

Users of wger Workout Manager should upgrade to a patched version beyond 2.2.0a3. The wger project recommends implementing proper CSRF tokens in all forms. As of this writing, no official patch has been released, but users can apply workarounds such as enabling same-site cookies or using a web application firewall (WAF) to mitigate the risk.[3][4]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
wgerPyPI
<= 2.2.0a3

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.