The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 0.1.6. This is due to the `scheduler_widget_ajax_save_event()` function lacking proper authorization checks and ownership verification when updating events. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify any event in the scheduler via the `id` parameter granted they have knowledge of the event ID.
Metrics
Affected Vendors & Products
References
History
Sat, 14 Feb 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Scheduler Widget plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 0.1.6. This is due to the `scheduler_widget_ajax_save_event()` function lacking proper authorization checks and ownership verification when updating events. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify any event in the scheduler via the `id` parameter granted they have knowledge of the event ID. | |
| Title | Scheduler Widget <= 0.1.6 - Insecure Direct Object Reference to Authenticated (Subscriber+) Arbitrary Event Modification | |
| Weaknesses | CWE-639 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-14T06:42:37.284Z
Reserved: 2026-02-05T15:13:29.984Z
Link: CVE-2026-1987
No data.
Status : Received
Published: 2026-02-14T07:16:12.493
Modified: 2026-02-14T07:16:12.493
Link: CVE-2026-1987
No data.
OpenCVE Enrichment
No data.