Description
The LatePoint plugin for WordPress is vulnerable to Authentication Bypass due to insufficient identity verification within the steps__load_step route of the latepoint_route_call AJAX endpoint in all versions up to, and including, 5.1.94. The endpoint reads the client-supplied customer email and related customer fields before invoking the internal login handler without verifying login status, capability checks, or a valid AJAX nonce. This makes it possible for unauthenticated attackers to log into any customer’s account.
Problem types
CWE-288 Authentication Bypass Using an Alternate Path or Channel
Product status
*
Timeline
2025-07-08: | Vendor Notified |
2025-09-29: | Disclosed |
Credits
wesley
References
www.wordfence.com/...-a357-481a-8716-3a93cb6afa7c?source=cve
wordpress.org/plugins/latepoint/
plugins.trac.wordpress.org/...oint/tags/5.1.93/latepoint.php
plugins.trac.wordpress.org/...ntrollers/steps_controller.php
plugins.trac.wordpress.org/...atepoint&sfp_email=&sfph_mail=