CVE-2025-14873: CWE-352 Cross-Site Request Forgery (CSRF) in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.5. This is due to the 'call_by_route_name' function in the routing layer only validating user capabilities without enforcing nonce verification. This makes it possible for unauthenticated attackers to perform multiple administrative actions via forged requests granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
The LatePoint Calendar Booking Plugin for WordPress, widely used for managing appointments and events, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14873. This vulnerability exists in all plugin versions up to and including 5.2.5 due to insufficient request validation in the 'call_by_route_name' function. Specifically, while the function checks user capabilities, it fails to enforce nonce verification, a critical anti-CSRF measure. This flaw allows an unauthenticated attacker to craft malicious requests that, if an administrator is tricked into clicking, can execute unauthorized administrative actions such as modifying booking data or plugin settings. The attack vector requires no prior authentication but does require user interaction (clicking a malicious link). The vulnerability impacts the integrity of administrative operations but does not affect confidentiality or availability directly. The CVSS 3.1 base score of 4.3 reflects these factors: network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity only. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on this plugin for critical scheduling functions. The lack of nonce verification represents a common security oversight in web applications, emphasizing the importance of robust anti-CSRF protections in WordPress plugins handling sensitive administrative tasks.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative changes within the LatePoint plugin, potentially disrupting appointment scheduling, altering event details, or modifying plugin configurations. Such unauthorized changes can degrade service reliability and trustworthiness, impacting customer experience and operational continuity. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity compromise could facilitate further attacks or data inconsistencies. Organizations in sectors like healthcare, legal services, education, and hospitality that rely heavily on appointment booking systems are particularly at risk. Additionally, the exploitation requires social engineering to trick administrators, highlighting the risk of targeted phishing campaigns. Given the widespread use of WordPress and its plugins across Europe, the vulnerability poses a moderate threat to digital service providers and SMEs that may lack advanced security monitoring. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code could be developed and shared.
Mitigation Recommendations
1. Monitor the LatePoint plugin vendor for official patches and apply updates promptly once available. 2. Until patches are released, implement additional nonce verification manually if feasible by customizing the plugin code or using WordPress hooks to enforce nonce checks on administrative routes. 3. Restrict administrative access to the WordPress backend by IP whitelisting or VPN access to reduce exposure. 4. Educate administrators and privileged users about phishing risks and the dangers of clicking unsolicited links, especially those that could trigger administrative actions. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the plugin’s administrative endpoints. 6. Regularly audit plugin usage and administrative logs to detect unusual activities indicative of exploitation attempts. 7. Consider isolating critical booking systems or using alternative plugins with stronger security postures if immediate patching is not possible. 8. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account compromise that could facilitate exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14873: CWE-352 Cross-Site Request Forgery (CSRF) in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
Description
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.5. This is due to the 'call_by_route_name' function in the routing layer only validating user capabilities without enforcing nonce verification. This makes it possible for unauthenticated attackers to perform multiple administrative actions via forged requests granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
The LatePoint Calendar Booking Plugin for WordPress, widely used for managing appointments and events, contains a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14873. This vulnerability exists in all plugin versions up to and including 5.2.5 due to insufficient request validation in the 'call_by_route_name' function. Specifically, while the function checks user capabilities, it fails to enforce nonce verification, a critical anti-CSRF measure. This flaw allows an unauthenticated attacker to craft malicious requests that, if an administrator is tricked into clicking, can execute unauthorized administrative actions such as modifying booking data or plugin settings. The attack vector requires no prior authentication but does require user interaction (clicking a malicious link). The vulnerability impacts the integrity of administrative operations but does not affect confidentiality or availability directly. The CVSS 3.1 base score of 4.3 reflects these factors: network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity only. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on this plugin for critical scheduling functions. The lack of nonce verification represents a common security oversight in web applications, emphasizing the importance of robust anti-CSRF protections in WordPress plugins handling sensitive administrative tasks.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative changes within the LatePoint plugin, potentially disrupting appointment scheduling, altering event details, or modifying plugin configurations. Such unauthorized changes can degrade service reliability and trustworthiness, impacting customer experience and operational continuity. While the vulnerability does not directly expose sensitive data or cause denial of service, the integrity compromise could facilitate further attacks or data inconsistencies. Organizations in sectors like healthcare, legal services, education, and hospitality that rely heavily on appointment booking systems are particularly at risk. Additionally, the exploitation requires social engineering to trick administrators, highlighting the risk of targeted phishing campaigns. Given the widespread use of WordPress and its plugins across Europe, the vulnerability poses a moderate threat to digital service providers and SMEs that may lack advanced security monitoring. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code could be developed and shared.
Mitigation Recommendations
1. Monitor the LatePoint plugin vendor for official patches and apply updates promptly once available. 2. Until patches are released, implement additional nonce verification manually if feasible by customizing the plugin code or using WordPress hooks to enforce nonce checks on administrative routes. 3. Restrict administrative access to the WordPress backend by IP whitelisting or VPN access to reduce exposure. 4. Educate administrators and privileged users about phishing risks and the dangers of clicking unsolicited links, especially those that could trigger administrative actions. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious POST requests targeting the plugin’s administrative endpoints. 6. Regularly audit plugin usage and administrative logs to detect unusual activities indicative of exploitation attempts. 7. Consider isolating critical booking systems or using alternative plugins with stronger security postures if immediate patching is not possible. 8. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account compromise that could facilitate exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-18T06:12:42.314Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69901aebc9e1ff5ad8689304
Added to database: 2/14/2026, 6:49:15 AM
Last enriched: 2/14/2026, 7:19:43 AM
Last updated: 2/21/2026, 12:18:20 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.