CVE-2025-7052: CWE-352 Cross-Site Request Forgery (CSRF) in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.94. This is due to missing nonce validation on the change_password() function of its customer_cabinet__change_password AJAX route. The plugin hooks this endpoint via wp_ajax and wp_ajax_nopriv but does not verify a nonce or user capability before resetting the user’s password. This makes it possible for unauthenticated attackers who trick a logged-in customer (or, with “WP users as customers” enabled, an administrator) into visiting a malicious link to take over their account.
AI Analysis
Technical Summary
CVE-2025-7052 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin widely used for managing bookings and appointments. The vulnerability exists in all versions up to and including 5.1.94. Specifically, the issue arises from the lack of nonce validation in the change_password() function, which is exposed via the AJAX routes customer_cabinet__change_password hooked through wp_ajax and wp_ajax_nopriv. This means that the endpoint does not verify a security nonce or check user capabilities before allowing a password reset operation. Consequently, an unauthenticated attacker can craft a malicious link that, when visited by a logged-in customer or, if the “WP users as customers” setting is enabled, an administrator, triggers a password reset without their consent. This effectively allows the attacker to take over the victim’s account. The vulnerability is particularly dangerous because it requires no authentication from the attacker, only that the victim is logged in and visits a malicious URL, which can be delivered via phishing or other social engineering methods. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, though user interaction is necessary. No known exploits are currently reported in the wild, but the vulnerability’s nature makes it a prime target for exploitation once disclosed publicly. The lack of a patch link indicates that a fix may not yet be available or publicly released at the time of this report.
Potential Impact
For European organizations using WordPress sites with the LatePoint plugin, this vulnerability poses a significant risk. Attackers can hijack user accounts, including those of customers and potentially administrators if the 'WP users as customers' feature is enabled. This can lead to unauthorized access to sensitive booking information, personal data, and potentially administrative controls over the website. The compromise of administrator accounts could allow attackers to escalate their access, implant further malware, or disrupt business operations. Given that many European businesses rely on online appointment scheduling for customer engagement, exploitation could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to unauthorized data access), and financial losses. The ease of exploitation via CSRF and the absence of authentication checks amplify the threat, especially in environments where users may be less security-aware or where phishing attacks are prevalent. The vulnerability also threatens service availability if attackers modify or delete booking data or lock out legitimate users.
Mitigation Recommendations
Immediate mitigation steps include disabling the LatePoint plugin until a security patch is released. Administrators should monitor for updates from the vendor and apply patches promptly once available. In the interim, implementing Web Application Firewall (WAF) rules to detect and block suspicious POST requests to the customer_cabinet__change_password AJAX endpoint can reduce risk. Site owners should enforce strict user session management and educate users about phishing risks to minimize the chance of malicious link clicks. Additionally, enabling multi-factor authentication (MFA) for WordPress accounts can help mitigate account takeover even if passwords are reset. Reviewing and restricting the 'WP users as customers' setting to only trusted users reduces the attack surface. Logging and monitoring password change events and unusual login activities can provide early detection of exploitation attempts. Finally, developers maintaining custom integrations with LatePoint should audit their code to ensure nonce validation and capability checks are properly implemented on all sensitive AJAX endpoints.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7052: CWE-352 Cross-Site Request Forgery (CSRF) in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
Description
The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.94. This is due to missing nonce validation on the change_password() function of its customer_cabinet__change_password AJAX route. The plugin hooks this endpoint via wp_ajax and wp_ajax_nopriv but does not verify a nonce or user capability before resetting the user’s password. This makes it possible for unauthenticated attackers who trick a logged-in customer (or, with “WP users as customers” enabled, an administrator) into visiting a malicious link to take over their account.
AI-Powered Analysis
Technical Analysis
CVE-2025-7052 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin widely used for managing bookings and appointments. The vulnerability exists in all versions up to and including 5.1.94. Specifically, the issue arises from the lack of nonce validation in the change_password() function, which is exposed via the AJAX routes customer_cabinet__change_password hooked through wp_ajax and wp_ajax_nopriv. This means that the endpoint does not verify a security nonce or check user capabilities before allowing a password reset operation. Consequently, an unauthenticated attacker can craft a malicious link that, when visited by a logged-in customer or, if the “WP users as customers” setting is enabled, an administrator, triggers a password reset without their consent. This effectively allows the attacker to take over the victim’s account. The vulnerability is particularly dangerous because it requires no authentication from the attacker, only that the victim is logged in and visits a malicious URL, which can be delivered via phishing or other social engineering methods. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, though user interaction is necessary. No known exploits are currently reported in the wild, but the vulnerability’s nature makes it a prime target for exploitation once disclosed publicly. The lack of a patch link indicates that a fix may not yet be available or publicly released at the time of this report.
Potential Impact
For European organizations using WordPress sites with the LatePoint plugin, this vulnerability poses a significant risk. Attackers can hijack user accounts, including those of customers and potentially administrators if the 'WP users as customers' feature is enabled. This can lead to unauthorized access to sensitive booking information, personal data, and potentially administrative controls over the website. The compromise of administrator accounts could allow attackers to escalate their access, implant further malware, or disrupt business operations. Given that many European businesses rely on online appointment scheduling for customer engagement, exploitation could result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to unauthorized data access), and financial losses. The ease of exploitation via CSRF and the absence of authentication checks amplify the threat, especially in environments where users may be less security-aware or where phishing attacks are prevalent. The vulnerability also threatens service availability if attackers modify or delete booking data or lock out legitimate users.
Mitigation Recommendations
Immediate mitigation steps include disabling the LatePoint plugin until a security patch is released. Administrators should monitor for updates from the vendor and apply patches promptly once available. In the interim, implementing Web Application Firewall (WAF) rules to detect and block suspicious POST requests to the customer_cabinet__change_password AJAX endpoint can reduce risk. Site owners should enforce strict user session management and educate users about phishing risks to minimize the chance of malicious link clicks. Additionally, enabling multi-factor authentication (MFA) for WordPress accounts can help mitigate account takeover even if passwords are reset. Reviewing and restricting the 'WP users as customers' setting to only trusted users reduces the attack surface. Logging and monitoring password change events and unusual login activities can provide early detection of exploitation attempts. Finally, developers maintaining custom integrations with LatePoint should audit their code to ensure nonce validation and capability checks are properly implemented on all sensitive AJAX endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-03T19:21:30.973Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68db5dce3dea812c77a6ce67
Added to database: 9/30/2025, 4:34:22 AM
Last enriched: 9/30/2025, 4:34:46 AM
Last updated: 9/30/2025, 6:45:56 AM
Views: 6
Related Threats
CVE-2025-11163: CWE-284 Improper Access Control in wpmudev SmartCrawl SEO checker, analyzer & optimizer
MediumCVE-2025-7038: CWE-288 Authentication Bypass Using an Alternate Path or Channel in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
HighCVE-2025-6941: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
MediumCVE-2025-6815: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
MediumCVE-2025-9993: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in d3rd4v1d Bei Fen – WordPress Backup Plugin
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.