Description
The LatePoint plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.3.2. The vulnerability exists because the OsStripeConnectController::create_payment_intent_for_transaction action is registered as a public action (no authentication required) and loads invoices by sequential integer invoice_id without any access_key or ownership verification. This is in contrast to other invoice-related actions (view_by_key, payment_form, summary_before_payment) in OsInvoicesController which properly require a cryptographic UUID access_key. This makes it possible for unauthenticated attackers to enumerate valid invoice IDs via an error message oracle, create unauthorized transaction intent records in the database containing sensitive financial data (invoice_id, order_id, customer_id, charge_amount), and on sites with Stripe Connect configured, the response also leaks Stripe payment_intent_client_secret tokens, transaction_intent_key values, and payment amounts for any invoice.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
Any version
Timeline
| 2026-03-31: | Vendor Notified |
| 2026-04-16: | Disclosed |
Credits
darkestmode
References
www.wordfence.com/...-a18d-4907-8879-2412f8a1abed?source=cve
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php
plugins.trac.wordpress.org/.../stripe_connect_controller.php