🔐 CVE Alert

CVE-2026-7652

MEDIUM 5.3

LatePoint <= 5.5.0 - Unauthenticated Account Takeover via Weak Password Recovery Mechanism

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

The LatePoint plugin for WordPress is vulnerable to Account Takeover via Weak Password Recovery Mechanism in the unauthenticated guest booking flow in versions up to, and including, 5.5.0 This is due to the save_connected_wordpress_user() function propagating a LatePoint customer's email address to its linked WordPress user account via wp_update_user() without any ownership verification, combined with the guest booking flow's ability to overwrite an existing customer's email through phone-based merge without authentication. This makes it possible for unauthenticated attackers to overwrite the email address of a non-super-admin WordPress user account that is not yet linked to a LatePoint customer, enabling full account takeover by subsequently triggering the standard WordPress password-reset flow to the attacker-controlled address granted the plugin is configured with WordPress user integration enabled, phone-based contact merging, and customer authentication disabled. Administrator accounts on single-site installs are not affected.

CWE CWE-640
Vendor latepoint
Product latepoint – calendar booking plugin for appointments and events
Published May 9, 2026
Stay Ahead of the Next One

Get instant alerts for latepoint latepoint – calendar booking plugin for appointments and events

Be the first to know when new medium vulnerabilities affecting latepoint latepoint – calendar booking plugin for appointments and events are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

latepoint / LatePoint – Calendar Booking Plugin for Appointments and Events
0 ≤ 5.5.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/bdaa32cd-a148-4554-9fd5-f5b0a5b2d1c3?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/lib/helpers/steps_helper.php#L1940 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/lib/helpers/customer_helper.php#L238 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/trunk/latepoint.php#L1165 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/latepoint.php#L1165 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/trunk/lib/helpers/steps_helper.php#L1972 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/lib/helpers/steps_helper.php#L1972 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/trunk/lib/helpers/steps_helper.php#L1940 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/lib/helpers/steps_helper.php#L1940 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/trunk/lib/helpers/customer_helper.php#L238 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/lib/helpers/customer_helper.php#L238 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/latepoint.php#L1165 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/lib/helpers/steps_helper.php#L1972 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3522933/latepoint/trunk/latepoint.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?old_path=%2Flatepoint/tags/5.5.0&new_path=%2Flatepoint/tags/5.5.1

Credits

Michael Iden