CVE-2026-1537: CWE-862 Missing Authorization in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
CVE-2026-1537 is a medium-severity vulnerability in the LatePoint WordPress plugin that allows unauthenticated attackers to access sensitive booking data due to missing authorization checks. The flaw exists in the load_step() function, enabling attackers to view customer names, emails, phone numbers, appointment times, and service details without any authentication or user interaction. This vulnerability affects all versions up to and including 5. 2. 6. Although no known exploits are currently reported in the wild, the exposure of personal and appointment data poses privacy and confidentiality risks. European organizations using LatePoint for appointment management could face data leakage impacting customer trust and regulatory compliance. Mitigation requires updating the plugin once a patch is released or applying custom access controls to restrict unauthenticated access. Countries with high WordPress usage and significant SME sectors relying on appointment booking plugins, such as Germany, France, and the UK, are more likely to be affected. The vulnerability has a CVSS score of 5.
AI Analysis
Technical Summary
CVE-2026-1537 identifies a missing authorization vulnerability (CWE-862) in the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin widely used for managing bookings and appointments. The vulnerability resides in the load_step() function, which lacks proper capability checks, allowing unauthenticated attackers to retrieve sensitive booking information. This includes personally identifiable information (PII) such as customer names, email addresses, phone numbers, appointment times, and details about the services booked. The flaw affects all plugin versions up to and including 5.2.6. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely by simply sending crafted requests to the vulnerable endpoint. The CVSS v3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact without affecting integrity or availability. No patches or known exploits have been reported at the time of publication, but the exposure of sensitive customer data can lead to privacy violations and potential regulatory non-compliance, especially under GDPR. The plugin is commonly used by small and medium enterprises (SMEs) and service providers for appointment scheduling, making the vulnerability relevant for organizations relying on WordPress-based booking systems.
Potential Impact
The primary impact of CVE-2026-1537 is unauthorized disclosure of sensitive customer and appointment data, which can lead to privacy breaches and loss of customer trust. For European organizations, this raises significant concerns under GDPR, as personal data exposure without consent can result in regulatory fines and reputational damage. The vulnerability does not affect data integrity or availability, but the confidentiality breach alone is critical in sectors handling sensitive client information, such as healthcare, legal services, and financial consulting. Attackers could leverage the exposed data for phishing, social engineering, or identity theft. Organizations using LatePoint for appointment management may face operational disruptions if customers lose confidence in their data protection practices. The ease of exploitation without authentication increases the risk of widespread data scraping or targeted reconnaissance by malicious actors. Although no active exploitation is known, the vulnerability's presence in a popular WordPress plugin amplifies its potential impact across multiple industries in Europe.
Mitigation Recommendations
1. Monitor the LatePoint plugin vendor’s official channels for security patches addressing CVE-2026-1537 and apply updates immediately upon release. 2. Until a patch is available, implement web application firewall (WAF) rules to block or restrict access to the load_step() function or related endpoints from unauthenticated users. 3. Restrict access to the WordPress admin and plugin endpoints using IP whitelisting or VPN access where feasible. 4. Conduct a thorough audit of booking data exposure and review logs for any suspicious access patterns targeting the plugin’s endpoints. 5. Consider temporarily disabling the LatePoint plugin if the risk of data exposure outweighs operational needs. 6. Educate staff and customers about potential phishing risks stemming from exposed data. 7. Implement strict role-based access controls within WordPress to minimize unnecessary permissions. 8. Regularly back up booking data and ensure backups are securely stored to prevent data loss from potential follow-up attacks. 9. Review and update privacy policies and incident response plans to address potential data breaches involving appointment data.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2026-1537: CWE-862 Missing Authorization in latepoint LatePoint – Calendar Booking Plugin for Appointments and Events
Description
CVE-2026-1537 is a medium-severity vulnerability in the LatePoint WordPress plugin that allows unauthenticated attackers to access sensitive booking data due to missing authorization checks. The flaw exists in the load_step() function, enabling attackers to view customer names, emails, phone numbers, appointment times, and service details without any authentication or user interaction. This vulnerability affects all versions up to and including 5. 2. 6. Although no known exploits are currently reported in the wild, the exposure of personal and appointment data poses privacy and confidentiality risks. European organizations using LatePoint for appointment management could face data leakage impacting customer trust and regulatory compliance. Mitigation requires updating the plugin once a patch is released or applying custom access controls to restrict unauthenticated access. Countries with high WordPress usage and significant SME sectors relying on appointment booking plugins, such as Germany, France, and the UK, are more likely to be affected. The vulnerability has a CVSS score of 5.
AI-Powered Analysis
Technical Analysis
CVE-2026-1537 identifies a missing authorization vulnerability (CWE-862) in the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin widely used for managing bookings and appointments. The vulnerability resides in the load_step() function, which lacks proper capability checks, allowing unauthenticated attackers to retrieve sensitive booking information. This includes personally identifiable information (PII) such as customer names, email addresses, phone numbers, appointment times, and details about the services booked. The flaw affects all plugin versions up to and including 5.2.6. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely by simply sending crafted requests to the vulnerable endpoint. The CVSS v3.1 base score is 5.3 (medium), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact without affecting integrity or availability. No patches or known exploits have been reported at the time of publication, but the exposure of sensitive customer data can lead to privacy violations and potential regulatory non-compliance, especially under GDPR. The plugin is commonly used by small and medium enterprises (SMEs) and service providers for appointment scheduling, making the vulnerability relevant for organizations relying on WordPress-based booking systems.
Potential Impact
The primary impact of CVE-2026-1537 is unauthorized disclosure of sensitive customer and appointment data, which can lead to privacy breaches and loss of customer trust. For European organizations, this raises significant concerns under GDPR, as personal data exposure without consent can result in regulatory fines and reputational damage. The vulnerability does not affect data integrity or availability, but the confidentiality breach alone is critical in sectors handling sensitive client information, such as healthcare, legal services, and financial consulting. Attackers could leverage the exposed data for phishing, social engineering, or identity theft. Organizations using LatePoint for appointment management may face operational disruptions if customers lose confidence in their data protection practices. The ease of exploitation without authentication increases the risk of widespread data scraping or targeted reconnaissance by malicious actors. Although no active exploitation is known, the vulnerability's presence in a popular WordPress plugin amplifies its potential impact across multiple industries in Europe.
Mitigation Recommendations
1. Monitor the LatePoint plugin vendor’s official channels for security patches addressing CVE-2026-1537 and apply updates immediately upon release. 2. Until a patch is available, implement web application firewall (WAF) rules to block or restrict access to the load_step() function or related endpoints from unauthenticated users. 3. Restrict access to the WordPress admin and plugin endpoints using IP whitelisting or VPN access where feasible. 4. Conduct a thorough audit of booking data exposure and review logs for any suspicious access patterns targeting the plugin’s endpoints. 5. Consider temporarily disabling the LatePoint plugin if the risk of data exposure outweighs operational needs. 6. Educate staff and customers about potential phishing risks stemming from exposed data. 7. Implement strict role-based access controls within WordPress to minimize unnecessary permissions. 8. Regularly back up booking data and ensure backups are securely stored to prevent data loss from potential follow-up attacks. 9. Review and update privacy policies and incident response plans to address potential data breaches involving appointment data.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-28T14:12:35.919Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698d49854b57a58fa1aa88f5
Added to database: 2/12/2026, 3:31:17 AM
Last enriched: 2/12/2026, 3:46:02 AM
Last updated: 2/12/2026, 6:39:50 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14892: CWE-269 Improper Privilege Management in Prime Listing Manager
CriticalCVE-2024-57049: n/a
CriticalCVE-2026-2327: Regular Expression Denial of Service (ReDoS) in markdown-it
MediumCVE-2026-26235: Missing Authentication for Critical Function in ALBRECHT JUNG GMBH & CO. KG JUNG Smart Visu Server
HighCVE-2026-26234: Improper Neutralization of HTTP Headers for Scripting Syntax in ALBRECHT JUNG GMBH & CO. KG JUNG Smart Visu Server
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.