PT-2026-26721 · Sweetdaisy86 · Repairbuddy – Repair Shop Crm & Booking Plugin For Wordpress
Ronnachai Chaipha
+1
·
Published
2026-03-20
·
Updated
2026-03-21
·
CVE-2026-3567
CVSS v3.1
5.3
Medium
| AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
The RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 4.1132. The plugin exposes two AJAX handlers that, when combined, allow any authenticated user to modify admin-level plugin settings. First, the wc rb get fresh nonce() function (registered via wp ajax and wp ajax nopriv hooks) allows any user to generate a valid WordPress nonce for any arbitrary action name by simply providing the nonce name parameter, with no capability checks. Second, the wc rep shop settings submission() function only verifies the nonce (wcrb main setting nonce) but performs no current user can() capability check before updating 15+ plugin options via update option(). This makes it possible for authenticated attackers, with subscriber-level access and above, to modify all plugin configuration settings including business name, email, logo, menu label, GDPR settings, and more by first minting a valid nonce via the wc rb get fresh nonce endpoint and then calling the settings submission handler.
Fix
Missing Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Repairbuddy – Repair Shop Crm & Booking Plugin For Wordpress