Browse all 3 CVE security advisories affecting sweetdaisy86. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Sweetdaisy86 operates primarily in web application development and deployment, with a core focus on user-facing platforms. Historically, this entity has been associated with vulnerabilities including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws, particularly in custom-built content management systems. Security assessments reveal inconsistent input validation and insufficient access controls as recurring patterns. While no major public incidents have been documented, the three CVEs on record indicate persistent security gaps in their development practices, suggesting a need for enhanced secure coding protocols and regular security testing to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-3567 | RepairBuddy <= 4.1132 - Missing Authorization to Authenticated (Subscriber+) Plugin Settings Modification via wc_rep_shop_settings_submission AJAX Action — RepairBuddy – Repair Shop CRM & Booking Plugin for WordPressCWE-862 | 5.3 | Medium | 2026-03-20 |
| CVE-2026-0820 | RepairBuddy <= 4.1116 - Insecure Direct Object Reference to Authenticated (Subscriber+) Arbitrary Signature Upload to Orders — RepairBuddy – Repair Shop CRM & Booking Plugin for WordPressCWE-862 | 4.3 | Medium | 2026-01-17 |
| CVE-2024-12259 | CRM WordPress Plugin – RepairBuddy <= 3.8120 - Missing Authorization to Account Takeover/Privilege Escalation — RepairBuddy – Repair Shop CRM & Booking Plugin for WordPressCWE-862 | 8.8 | High | 2024-12-18 |
This page lists every published CVE security advisory associated with sweetdaisy86. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.