PT-2026-37353 · Latepoint · Latepoint – Calendar Booking Plugin For Appointments/Events
Niv Kochan
·
Published
2026-05-06
·
Updated
2026-05-06
·
CVE-2026-7457
CVSS v3.1
6.4
Medium
| Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N |
The LatePoint plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to and including 5.5.0. This is due to insufficient input sanitization on the customer cabinet profile update endpoint — where raw POST parameters (first name, last name, phone, notes) bypass sanitization because OsCustomerModel does not override params to sanitize(), causing set data() to store unsanitized values verbatim in the database — combined with insufficient output escaping in generate preview(), which injects those stored values into notification template HTML via str replace() without any esc html() call before echoing the result. This makes it possible for authenticated attackers with customer-level access or above to inject arbitrary web scripts into the admin notification preview panel that execute in an administrator's or agent's browser whenever a notification template referencing customer variables such as {{customer full name}}, {{customer first name}}, {{customer last name}}, {{customer phone}}, or {{customer notes}} is previewed.
Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Latepoint – Calendar Booking Plugin For Appointments/Events