Home

Description

The LatePoint plugin for WordPress is vulnerable to Account Takeover via Weak Password Recovery Mechanism in the unauthenticated guest booking flow in versions up to, and including, 5.5.0 This is due to the save_connected_wordpress_user() function propagating a LatePoint customer's email address to its linked WordPress user account via wp_update_user() without any ownership verification, combined with the guest booking flow's ability to overwrite an existing customer's email through phone-based merge without authentication. This makes it possible for unauthenticated attackers to overwrite the email address of a non-super-admin WordPress user account that is not yet linked to a LatePoint customer, enabling full account takeover by subsequently triggering the standard WordPress password-reset flow to the attacker-controlled address granted the plugin is configured with WordPress user integration enabled, phone-based contact merging, and customer authentication disabled. Administrator accounts on single-site installs are not affected.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-09 | Updated 2026-05-09 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-640 Weak Password Recovery Mechanism for Forgotten Password

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-01:Vendor Notified
2026-05-08:Disclosed

Credits

Michael Iden finder

References

www.wordfence.com/...-a148-4554-9fd5-f5b0a5b2d1c3?source=cve

plugins.trac.wordpress.org/...2/lib/helpers/steps_helper.php

plugins.trac.wordpress.org/...ib/helpers/customer_helper.php

plugins.trac.wordpress.org/.../latepoint/trunk/latepoint.php

plugins.trac.wordpress.org/...point/tags/5.5.0/latepoint.php

plugins.trac.wordpress.org/...k/lib/helpers/steps_helper.php

plugins.trac.wordpress.org/...0/lib/helpers/steps_helper.php

plugins.trac.wordpress.org/...k/lib/helpers/steps_helper.php

plugins.trac.wordpress.org/...0/lib/helpers/steps_helper.php

plugins.trac.wordpress.org/...ib/helpers/customer_helper.php

plugins.trac.wordpress.org/...ib/helpers/customer_helper.php

plugins.trac.wordpress.org/...point/tags/5.4.2/latepoint.php

plugins.trac.wordpress.org/...2/lib/helpers/steps_helper.php

plugins.trac.wordpress.org/.../latepoint/trunk/latepoint.php

plugins.trac.wordpress.org/...w_path=%2Flatepoint/tags/5.5.1

cve.org (CVE-2026-7652)

nvd.nist.gov (CVE-2026-7652)

Download JSON