The LatePoint plugin for WordPress is vulnerable to Account Takeover via Weak Password Recovery Mechanism in the unauthenticated guest booking flow in versions up to, and including, 5.5.0 This is due to the save_connected_wordpress_user() function propagating a LatePoint customer's email address to its linked WordPress user account via wp_update_user() without any ownership verification, combined with the guest booking flow's ability to overwrite an existing customer's email through phone-based merge without authentication. This makes it possible for unauthenticated attackers to overwrite the email address of a non-super-admin WordPress user account that is not yet linked to a LatePoint customer, enabling full account takeover by subsequently triggering the standard WordPress password-reset flow to the attacker-controlled address granted the plugin is configured with WordPress user integration enabled, phone-based contact merging, and customer authentication disabled. Administrator accounts on single-site installs are not affected.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 09 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Latepoint
Latepoint latepoint – Calendar Booking Plugin For Appointments And Events Wordpress Wordpress wordpress |
|
| Vendors & Products |
Latepoint
Latepoint latepoint – Calendar Booking Plugin For Appointments And Events Wordpress Wordpress wordpress |
Sat, 09 May 2026 03:00:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-09T02:25:39.060Z
Reserved: 2026-05-01T17:56:49.365Z
Link: CVE-2026-7652
No data.
Status : Received
Published: 2026-05-09T03:16:15.117
Modified: 2026-05-09T03:16:15.117
Link: CVE-2026-7652
No data.
OpenCVE Enrichment
Updated: 2026-05-09T04:30:17Z
Weaknesses