CVE-2026-7652
Received Received - Intake
Account Takeover in LatePoint WordPress Plugin via Weak Password Recovery

Publication date: 2026-05-09

Last updated on: 2026-05-09

Assigner: Wordfence

Description
The LatePoint plugin for WordPress is vulnerable to Account Takeover via Weak Password Recovery Mechanism in the unauthenticated guest booking flow in versions up to, and including, 5.5.0 This is due to the save_connected_wordpress_user() function propagating a LatePoint customer's email address to its linked WordPress user account via wp_update_user() without any ownership verification, combined with the guest booking flow's ability to overwrite an existing customer's email through phone-based merge without authentication. This makes it possible for unauthenticated attackers to overwrite the email address of a non-super-admin WordPress user account that is not yet linked to a LatePoint customer, enabling full account takeover by subsequently triggering the standard WordPress password-reset flow to the attacker-controlled address granted the plugin is configured with WordPress user integration enabled, phone-based contact merging, and customer authentication disabled. Administrator accounts on single-site installs are not affected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-09
Last Modified
2026-05-09
Generated
2026-05-09
AI Q&A
2026-05-09
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
latepoint latepoint to 5.5.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-640 The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The LatePoint plugin for WordPress has a vulnerability that allows an unauthenticated attacker to take over user accounts. This happens because the plugin's function save_connected_wordpress_user() updates a WordPress user's email address without verifying ownership. Combined with the guest booking flow's ability to overwrite a customer's email via phone-based merging without authentication, an attacker can change the email address of a WordPress user account that is linked to LatePoint but not yet connected to a customer.

Once the attacker controls the email address, they can trigger the standard WordPress password reset process to gain full access to that user account. This vulnerability affects versions up to and including 5.5.0 of the LatePoint plugin, but administrator accounts on single-site installs are not affected.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized account takeover by attackers without needing to authenticate. If exploited, an attacker can gain control over a WordPress user account by changing its email address and resetting the password.

The impact includes potential loss of control over user accounts, unauthorized access to user data, and possible misuse of the compromised accounts. However, administrator accounts on single-site WordPress installations are not vulnerable.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart