Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14873: CWE-352 Cross-Site Request Forgery (CSRF) in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events

0
Medium
VulnerabilityCVE-2025-14873cvecve-2025-14873cwe-352
Published: Sat Feb 14 2026 (02/14/2026, 06:42:26 UTC)
Source: CVE Database V5
Vendor/Project: latepoint
Product: LatePoint – Calendar Booking Plugin for Appointments and Events

Description

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.5. This is due to the 'call_by_route_name' function in the routing layer only validating user capabilities without enforcing nonce verification. This makes it possible for unauthenticated attackers to perform multiple administrative actions via forged requests granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 02/14/2026, 07:19:43 UTC

Technical Analysis

The LatePoint Calendar Booking Plugin for WordPress, widely used for managing appointments and events, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14873. This vulnerability exists in all plugin versions up to and including 5.2.5 due to insufficient request validation in the 'call_by_route_name' function. Specifically, while the function checks user capabilities, it fails to enforce nonce verification, a critical anti-CSRF measure. This flaw allows an unauthenticated attacker to craft malicious requests that, if an administrator is tricked into clicking, can execute unauthorized administrative actions such as modifying booking data or plugin settings. The attack vector requires no prior authentication but does require user interaction (clicking a malicious link). The vulnerability impacts the integrity of administrative operations but does not affect confidentiality or availability directly. The CVSS 3.1 base score of 4.3 reflects these factors: network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity only. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on this plugin for critical scheduling functions. The lack of nonce verification represents a common security oversight in web applications, emphasizing the importance of robust anti-CSRF protections in WordPress plugins handling sensitive administrative tasks.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized administrative changes within the LatePoint plugin, potentially disrupting appointment scheduling, altering event details, or modifying plugin configurations. Such unauthorized changes can degrade service reliability and trustworthiness, impacting customer experience and operational continuity. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity compromise could facilitate further attacks or data inconsistencies. Organizations in sectors like healthcare, legal services, education, and hospitality that rely heavily on appointment booking systems are particularly at risk. Additionally, the exploitation requires social engineering to trick administrators, highlighting the risk of targeted phishing campaigns. Given the widespread use of WordPress and its plugins across Europe, the vulnerability poses a moderate threat to digital service providers and SMEs that may lack advanced security monitoring. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code could be developed and shared.

Mitigation Recommendations

1. Monitor the LatePoint plugin vendor for official patches and apply updates promptly once available. 2. Until patches are released, implement additional nonce verification manually if feasible by customizing the plugin code or using WordPress hooks to enforce nonce checks on administrative routes. 3. Restrict administrative access to the WordPress backend by IP whitelisting or VPN access to reduce exposure. 4. Educate administrators and privileged users about phishing risks and the dangers of clicking unsolicited links, especially those that could trigger administrative actions. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the plugin’s administrative endpoints. 6. Regularly audit plugin usage and administrative logs to detect unusual activities indicative of exploitation attempts. 7. Consider isolating critical booking systems or using alternative plugins with stronger security postures if immediate patching is not possible. 8. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account compromise that could facilitate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-18T06:12:42.314Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901aebc9e1ff5ad8689304

Added to database: 2/14/2026, 6:49:15 AM

Last enriched: 2/14/2026, 7:19:43 AM

Last updated: 2/21/2026, 12:18:20 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats