Vulnerability Description
The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 0.1.6. This is due to the `scheduler_widget_ajax_save_event()` function lacking proper authorization checks and ownership verification when updating events. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify any event in the scheduler via the `id` parameter granted they have knowledge of the event ID.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://cwe.mitre.org/data/definitions/639.html
- https://cwe.mitre.org/data/definitions/862.html
- https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Applicatio
- https://plugins.trac.wordpress.org/browser/scheduler-widget/tags/0.1.6/scheduler
- https://plugins.trac.wordpress.org/browser/scheduler-widget/trunk/scheduler-widg
- https://www.wordfence.com/threat-intel/vulnerabilities/id/fd5f370c-743f-41f1-80a
FAQ
What is CVE-2026-1987?
CVE-2026-1987 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 0.1.6. This is due to the `scheduler_widget_ajax_save_event()` functio...
How severe is CVE-2026-1987?
CVE-2026-1987 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1987?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.