Atomic Edge analysis of CVE-2026-1987 (metadata-based):
This vulnerability is an Insecure Direct Object Reference (IDOR) in the Scheduler Widget WordPress plugin version 0.1.6 and earlier. The flaw resides in the `scheduler_widget_ajax_save_event()` AJAX handler, which lacks proper authorization and ownership verification. Attackers with authenticated Subscriber-level access can modify arbitrary scheduler events by manipulating the `id` parameter.
Atomic Edge research identifies the root cause as CWE-639, Authorization Bypass Through User-Controlled Key. The vulnerability description confirms the `scheduler_widget_ajax_save_event()` function does not validate if the requesting user owns the event ID they supply. This is inferred to be a missing capability check (like `current_user_can()`) and missing ownership verification (like comparing the event’s author ID to the current user ID). The plugin likely uses the `id` parameter directly in an update operation without these checks.
Exploitation requires an authenticated WordPress user account with at least Subscriber privileges. Attackers send a POST request to the WordPress AJAX endpoint `/wp-admin/admin-ajax.php` with the action parameter set to `scheduler_widget_ajax_save_event`. The payload includes the target event’s numeric ID in the `id` parameter, along with other event data fields (like `title`, `description`, `date`) that the attacker wishes to modify. Knowledge of the target event ID is required, which could be obtained through enumeration or other information disclosure.
Remediation requires implementing proper authorization checks before processing the update request. The fix should verify the user has appropriate capabilities (likely `edit_posts` or a custom capability) to modify events. Additionally, the function must confirm the user owns the event by checking the event’s stored author ID matches the current user’s ID, unless the user has administrative privileges. Nonce verification should also be added to prevent CSRF attacks, though its absence is not the primary vulnerability.
The impact is unauthorized modification of scheduler events. Attackers can alter event titles, descriptions, dates, or other stored data. This constitutes integrity loss (I:L in CVSS) and a limited availability impact (A:L) if critical events are deleted or made inaccessible. The vulnerability does not enable privilege escalation directly, but could facilitate social engineering or workflow disruption if the scheduler displays manipulated information.







