Skip to main content

CVE-2025-3769: CWE-639 Authorization Bypass Through User-Controlled Key in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events

Medium
VulnerabilityCVE-2025-3769cvecve-2025-3769cwe-639
Published: Wed May 14 2025 (05/14/2025, 11:12:25 UTC)
Source: CVE
Vendor/Project: latepoint
Product: LatePoint – Calendar Booking Plugin for Appointments and Events

Description

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.92 via the 'view_booking_summary_in_lightbox' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to retrieve appointment details such as customer names and email addresses.

AI-Powered Analysis

AILast updated: 07/06/2025, 16:41:48 UTC

Technical Analysis

CVE-2025-3769 is a medium-severity vulnerability affecting the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin widely used for managing appointment bookings and events. The vulnerability is classified as an Insecure Direct Object Reference (IDOR), specifically CWE-639, which arises due to improper authorization checks on a user-controlled key parameter named 'view_booking_summary_in_lightbox'. This flaw exists in all versions up to and including 5.1.92. Because the plugin fails to validate whether the requesting user is authorized to access specific booking details, unauthenticated attackers can exploit this weakness to retrieve sensitive appointment information such as customer names and email addresses. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality loss, with no integrity or availability effects reported. Although no known exploits are currently observed in the wild, the ease of exploitation and the sensitive nature of the data exposed make this a significant privacy concern. The lack of a patch link suggests that a fix may not yet be publicly available, underscoring the need for immediate attention by administrators using this plugin. Given the plugin's role in handling personal appointment data, exploitation could lead to privacy violations and potential regulatory compliance issues, especially under GDPR in Europe.

Potential Impact

For European organizations, the exposure of customer names and email addresses through this vulnerability poses a direct threat to personal data confidentiality, potentially leading to violations of the EU General Data Protection Regulation (GDPR). Organizations relying on LatePoint for managing appointments—such as healthcare providers, legal firms, educational institutions, and service businesses—could face reputational damage, loss of customer trust, and financial penalties if personal data is leaked. The unauthorized disclosure of appointment details could also facilitate targeted phishing attacks or social engineering campaigns against affected individuals or organizations. While the vulnerability does not allow modification or deletion of data, the breach of confidentiality alone is significant given the sensitivity of personal information involved. Additionally, the ease of exploitation without authentication increases the risk of automated scanning and mass data harvesting by malicious actors. European organizations must therefore prioritize addressing this vulnerability to maintain compliance and protect customer privacy.

Mitigation Recommendations

1. Immediate mitigation should include disabling or restricting access to the 'view_booking_summary_in_lightbox' functionality until a patch is available. 2. Monitor web server logs for suspicious requests targeting this parameter to detect potential exploitation attempts. 3. Implement web application firewall (WAF) rules to block or rate-limit requests containing suspicious or unexpected values for the vulnerable parameter. 4. Restrict access to the booking summary feature by enforcing authentication and authorization checks at the application or server level as a temporary control. 5. Regularly update the LatePoint plugin to the latest version once a security patch addressing this vulnerability is released by the vendor. 6. Conduct an audit of stored appointment data to identify any unauthorized access or data leakage. 7. Inform affected customers if a breach is suspected, in compliance with GDPR notification requirements. 8. Consider isolating the WordPress environment hosting LatePoint to minimize lateral movement risks in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-17T15:37:44.705Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecb11

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 4:41:48 PM

Last updated: 8/15/2025, 11:42:25 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats