CVE-2026-0820
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-17

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference due to missing capability checks on the wc_upload_and_save_signature_handler function in all versions up to, and including, 4.1116. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary signatures to any order in the system, potentially modifying order metadata and triggering unauthorized status changes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-17
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2026-01-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
unknown_vendor computer_repair_shop to 4.1116 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Insecure Direct Object Reference (IDOR) in the RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress. It occurs because the function wc_upload_and_save_signature_handler lacks proper capability checks. As a result, authenticated users with Subscriber-level access or higher can upload arbitrary signatures to any order in the system. This allows them to potentially modify order metadata and trigger unauthorized changes to order statuses. [1, 3]


How can this vulnerability impact me? :

The vulnerability allows attackers with low-level authenticated access (Subscriber or above) to upload arbitrary signatures to any order. This can lead to unauthorized modification of order metadata and unauthorized changes to order statuses. Such actions could disrupt business operations, cause incorrect order processing, and potentially lead to fraudulent activities or loss of trust in the system's integrity. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring for unauthorized or suspicious signature upload attempts to the RepairBuddy plugin's signature upload endpoint. Since the vulnerability allows authenticated users with Subscriber-level access and above to upload arbitrary signatures via the wc_upload_and_save_signature_handler function, you can detect exploitation attempts by inspecting web server logs or WordPress logs for POST requests to the AJAX action 'wc_upload_and_save_signature'. Specifically, look for POST requests containing parameters like 'order_id', 'job_case_number', 'signature_label', and possibly missing or invalid nonce or verification codes. Commands to detect such activity could include using grep on web server logs to find suspicious POST requests, for example: 1. grep 'wc_upload_and_save_signature' /var/log/apache2/access.log 2. grep 'POST' /var/log/apache2/access.log | grep 'wc_upload_and_save_signature' 3. Use WordPress security or audit plugins to log AJAX requests and user actions related to signature uploads. Additionally, monitoring for unexpected changes in order metadata or job status changes related to signature submissions may indicate exploitation. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress to the latest version beyond 4.1116 where the vulnerability is fixed. The update includes nonce verification, verification code checks, parameter validation, and expiration enforcement to prevent unauthorized signature uploads. 2. If updating immediately is not possible, restrict access to the signature upload AJAX endpoint by limiting permissions or disabling the feature temporarily to prevent unauthorized uploads. 3. Monitor and audit signature upload activities and order metadata changes to detect any exploitation attempts. 4. Implement additional security measures such as Web Application Firewalls (WAF) to block suspicious requests targeting the vulnerable endpoint. 5. Review user roles and permissions to ensure that only trusted users have Subscriber-level or higher access. These steps help prevent unauthorized signature uploads and protect order integrity. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart