Skip to main content

CVE-2025-6815: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events

Medium
VulnerabilityCVE-2025-6815cvecve-2025-6815cwe-79
Published: Tue Sep 30 2025 (09/30/2025, 04:27:06 UTC)
Source: CVE Database V5
Vendor/Project: latepoint
Product: LatePoint – Calendar Booking Plugin for Appointments and Events

Description

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘service[name]’ parameter in all versions up to, and including, 5.1.94 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 09/30/2025, 04:35:26 UTC

Technical Analysis

CVE-2025-6815 is a stored Cross-Site Scripting (XSS) vulnerability identified in the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin widely used for managing bookings and events. The vulnerability arises from improper neutralization of input during web page generation, specifically via the 'service[name]' parameter. In all versions up to and including 5.1.94, the plugin fails to adequately sanitize and escape input, allowing an authenticated attacker with administrator-level privileges to inject arbitrary JavaScript code into pages. This malicious script is then executed whenever any user accesses the compromised page. Notably, this vulnerability only affects multi-site WordPress installations or those where the 'unfiltered_html' capability is disabled, which restricts users from posting unfiltered HTML content. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is network-based with low attack complexity but requires high privileges (administrator) and no user interaction. The scope is changed, indicating that the vulnerability can affect resources beyond the initially compromised component. The impact includes limited confidentiality and integrity loss but no availability impact. There are currently no known exploits in the wild, and no official patches have been linked yet. The vulnerability is categorized under CWE-79, which concerns improper input validation leading to XSS attacks. This vulnerability is significant because it allows persistent script injection, which can be used for session hijacking, privilege escalation, or delivering further attacks within the affected WordPress environment.

Potential Impact

For European organizations using the LatePoint plugin in multi-site WordPress environments or with restricted HTML capabilities, this vulnerability poses a moderate risk. An attacker with administrator access could inject malicious scripts that execute in the context of other users, potentially leading to session hijacking, theft of sensitive data, or manipulation of booking information. Given that administrator privileges are required, the threat vector is somewhat limited to insider threats or compromised admin accounts. However, the persistent nature of stored XSS means that once exploited, the attacker can maintain a foothold or conduct further attacks on users accessing the affected pages. This could disrupt business operations, damage reputation, and lead to data breaches, especially in sectors relying heavily on appointment scheduling such as healthcare, legal services, and customer support. The lack of availability impact reduces the risk of service disruption, but confidentiality and integrity concerns remain significant. Additionally, the multi-site limitation means that larger organizations or agencies managing multiple client sites are more at risk. The absence of known exploits in the wild suggests that immediate widespread attacks are unlikely but vigilance is necessary.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately audit their WordPress installations to identify if LatePoint plugin versions up to 5.1.94 are in use, particularly in multi-site configurations or where 'unfiltered_html' is disabled. 2) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 3) Implement Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'service[name]' parameter. 4) Monitor logs for unusual administrator activity or unexpected script injections in booking pages. 5) Until an official patch is released, consider disabling the LatePoint plugin or limiting its use to single-site installations if feasible. 6) Educate administrators about the risks of stored XSS and the importance of input validation. 7) Regularly update WordPress core and plugins to the latest versions once patches become available. 8) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts on affected domains. These steps go beyond generic advice by focusing on configuration specifics, access control, and compensating controls tailored to the plugin’s usage context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-27T16:43:04.262Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db5dce3dea812c77a6ce55

Added to database: 9/30/2025, 4:34:22 AM

Last enriched: 9/30/2025, 4:35:26 AM

Last updated: 9/30/2025, 6:30:18 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats