The vulnerability is an Insecure Direct Object Reference (IDOR) in three nutritional_values action endpoints within wger/nutrition/api/views.py. The NutritionPlanViewSet, MealViewSet, and MealItemViewSet all contain a nutritional_values method that fetches an object directly from the database using Model.objects.get(pk=pk). This ORM call does not enforce any ownership checks, meaning any authenticated user can access another user's private nutrition data by simply providing a valid primary key in the URL. The fix would be to use self.get_object(), which is the standard Django Rest Framework way to get an object for a detail view and automatically applies the view's queryset, or to explicitly filter by the current user, for example: NutritionPlan.objects.get(pk=pk, user=self.request.user).