CVE-2025-7052
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-30

Last updated on: 2025-10-02

Assigner: Wordfence

Description
The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.94. This is due to missing nonce validation on the change_password() function of its customer_cabinet__change_password AJAX route. The plugin hooks this endpoint via wp_ajax and wp_ajax_nopriv but does not verify a nonce or user capability before resetting the user’s password. This makes it possible for unauthenticated attackers who trick a logged-in customer (or, with β€œWP users as customers” enabled, an administrator) into visiting a malicious link to take over their account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-30
Last Modified
2025-10-02
Generated
2026-05-07
AI Q&A
2025-09-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
latepoint latepoint 5.1.93
latepoint latepoint 5.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Request Forgery (CSRF) issue in the LatePoint WordPress plugin versions up to 5.1.94. It occurs because the plugin's change_password() function does not validate a security nonce or check user capabilities before allowing a password reset via an AJAX route. As a result, an attacker can trick a logged-in user into visiting a malicious link that resets their password without their consent, potentially taking over their account.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to take over user accounts by resetting passwords without authorization. If an attacker tricks a logged-in customer or administrator into visiting a malicious link, they can gain control of that user's account, leading to unauthorized access, data theft, or further exploitation within the affected WordPress site.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the LatePoint plugin to a version later than 5.1.94 where the issue is fixed. If an update is not available, disable or restrict access to the customer_cabinet__change_password AJAX route to prevent unauthorized password resets. Additionally, consider disabling the 'WP users as customers' feature if enabled, and monitor for suspicious activity related to password changes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart