CVE-2026-7652
Description
The LatePoint plugin for WordPress is vulnerable to Account Takeover via Weak Password Recovery Mechanism in the unauthenticated guest booking flow in versions up to, and including, 5.5.0 This is due to the save_connected_wordpress_user() function propagating a LatePoint customer's email address to its linked WordPress user account via wp_update_user() without any ownership verification, combined with the guest booking flow's ability to overwrite an existing customer's email through phone-based merge without authentication. This makes it possible for unauthenticated attackers to overwrite the email address of a non-super-admin WordPress user account that is not yet linked to a LatePoint customer, enabling full account takeover by subsequently triggering the standard WordPress password-reset flow to the attacker-controlled address granted the plugin is configured with WordPress user integration enabled, phone-based contact merging, and customer authentication disabled. Administrator accounts on single-site installs are not affected.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/latepoint.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/lib/helpers/customer_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/lib/helpers/steps_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.4.2/lib/helpers/steps_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/latepoint.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/lib/helpers/customer_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/lib/helpers/steps_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/tags/5.5.0/lib/helpers/steps_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/trunk/latepoint.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/trunk/lib/helpers/customer_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/trunk/lib/helpers/steps_helper.phpnvd
- plugins.trac.wordpress.org/browser/latepoint/trunk/lib/helpers/steps_helper.phpnvd
- plugins.trac.wordpress.org/changeset/3522933/latepoint/trunk/latepoint.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/bdaa32cd-a148-4554-9fd5-f5b0a5b2d1c3nvd
News mentions
5- Wordfence Intelligence Weekly WordPress Vulnerability Report (May 4, 2026 to May 10, 2026)Wordfence Blog · May 14, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 27, 2026 to May 3, 2026)Wordfence Blog · May 7, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 13, 2026 to April 19, 2026)Wordfence Blog · Apr 23, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026)Wordfence Blog · Apr 16, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (March 23, 2026 to March 29, 2026)Wordfence Blog · Apr 2, 2026