Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7038: CWE-288 Authentication Bypass Using an Alternate Path or Channel in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events

0
High
VulnerabilityCVE-2025-7038cvecve-2025-7038cwe-288
Published: Tue Sep 30 2025 (09/30/2025, 04:27:07 UTC)
Source: CVE Database V5
Vendor/Project: latepoint
Product: LatePoint – Calendar Booking Plugin for Appointments and Events

Description

The LatePoint plugin for WordPress is vulnerable to Authentication Bypass due to insufficient identity verification within the steps__load_step route of the latepoint_route_call AJAX endpoint in all versions up to, and including, 5.1.94. The endpoint reads the client-supplied customer email and related customer fields before invoking the internal login handler without verifying login status, capability checks, or a valid AJAX nonce. This makes it possible for unauthenticated attackers to log into any customer’s account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:00:24 UTC

Technical Analysis

CVE-2025-7038 is an authentication bypass vulnerability classified under CWE-288, affecting the LatePoint plugin for WordPress, a widely used calendar booking system for appointments and events. The vulnerability resides in the AJAX endpoint latepoint_route_call, specifically within the steps__load_step route. This endpoint processes client-supplied data such as customer email and related fields before invoking an internal login handler. Critically, it fails to verify whether the requester is already authenticated, does not perform capability checks, and lacks validation of a valid AJAX nonce token. Consequently, an unauthenticated attacker can craft requests to this endpoint to impersonate any customer by supplying their email and related data, effectively bypassing authentication controls. This flaw affects all versions up to and including 5.1.94 of LatePoint. The vulnerability has a CVSS 3.1 base score of 8.2, reflecting its high severity, with an attack vector of network (remote exploitation), low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, allowing unauthorized access to customer accounts and their sensitive information, while integrity and availability impacts are limited. Although no public exploits have been reported yet, the straightforward exploitation path and the sensitive nature of the data involved make this a critical issue for organizations relying on LatePoint. The vulnerability was publicly disclosed on September 30, 2025, with no official patches available at the time of reporting, emphasizing the urgency for mitigation.

Potential Impact

The primary impact of CVE-2025-7038 is unauthorized access to customer accounts within the LatePoint booking system, leading to a significant confidentiality breach. Attackers can view sensitive customer information such as personal details, appointment schedules, and potentially payment or contact data stored within these accounts. This can result in privacy violations, identity theft, and reputational damage to organizations using the plugin. While the vulnerability does not directly allow modification of data (limited integrity impact) or denial of service (limited availability impact), the unauthorized access alone can facilitate further attacks, such as social engineering or lateral movement within an organization's infrastructure. Organizations worldwide that rely on LatePoint for managing appointments and events are at risk, especially those handling sensitive or regulated customer data. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks and mass compromise attempts. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates a critical need for immediate attention.

Mitigation Recommendations

1. Apply official patches from LatePoint as soon as they become available to address the authentication bypass vulnerability. 2. Until patches are released, restrict access to the latepoint_route_call AJAX endpoint by implementing web application firewall (WAF) rules that block unauthenticated requests or limit access to trusted IP ranges. 3. Implement additional server-side authentication checks and validate AJAX nonces rigorously within the plugin code to ensure that only authenticated users can invoke sensitive routes. 4. Monitor web server and application logs for unusual or repeated access attempts to the steps__load_step route, which may indicate exploitation attempts. 5. Conduct a thorough review of user accounts and audit logs to detect any unauthorized access or suspicious activity. 6. Educate administrative and development teams about the vulnerability and encourage prompt updates and security best practices. 7. Consider isolating the LatePoint plugin environment or using security plugins that can add layers of authentication and request validation. 8. Regularly back up customer data and ensure incident response plans are in place to quickly address any breaches resulting from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-02T20:41:45.476Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db5dce3dea812c77a6ce60

Added to database: 9/30/2025, 4:34:22 AM

Last enriched: 2/26/2026, 4:00:24 PM

Last updated: 3/24/2026, 6:52:04 PM

Views: 194

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses