PT-2026-39316 · Latepoint · Latepoint – Calendar Booking Plugin For Appointments/Events

Michael Iden

·

Published

2026-05-09

·

Updated

2026-05-09

·

CVE-2026-7652

CVSS v3.1

5.3

Medium

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
The LatePoint plugin for WordPress is vulnerable to Account Takeover via Weak Password Recovery Mechanism in the unauthenticated guest booking flow in versions up to, and including, 5.5.0 This is due to the save connected wordpress user() function propagating a LatePoint customer's email address to its linked WordPress user account via wp update user() without any ownership verification, combined with the guest booking flow's ability to overwrite an existing customer's email through phone-based merge without authentication. This makes it possible for unauthenticated attackers to overwrite the email address of a non-super-admin WordPress user account that is not yet linked to a LatePoint customer, enabling full account takeover by subsequently triggering the standard WordPress password-reset flow to the attacker-controlled address granted the plugin is configured with WordPress user integration enabled, phone-based contact merging, and customer authentication disabled. Administrator accounts on single-site installs are not affected.

Fix

Weakness Enumeration

Related Identifiers

CVE-2026-7652

Affected Products

Latepoint – Calendar Booking Plugin For Appointments/Events