CVE-2026-0617
📋 TL;DR
This stored XSS vulnerability in the LatePoint WordPress plugin allows unauthenticated attackers to inject malicious scripts into customer profile fields. When administrators view customer activity history, these scripts execute in their browser context. All WordPress sites using LatePoint plugin versions up to 5.2.5 are affected.
💻 Affected Systems
- LatePoint - Calendar Booking Plugin for Appointments and Events
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to full site takeover, data theft, or malware distribution to visitors.
Likely Case
Session hijacking of administrators, credential theft, or defacement of the WordPress site.
If Mitigated
Limited impact if administrators use browsers with XSS protection or have additional security layers.
🎯 Exploit Status
Simple XSS payload injection into customer profile fields. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.2.6 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find LatePoint plugin and click 'Update Now'. 4. Verify version is 5.2.6 or higher.
🔧 Temporary Workarounds
Disable LatePoint Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate latepoint
Restrict Admin Access
allLimit administrator access to trusted IP addresses only.
🧯 If You Can't Patch
- Implement Content Security Policy (CSP) headers to restrict script execution
- Use web application firewall (WAF) rules to block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → LatePoint → Version. If version is 5.2.5 or lower, you are vulnerable.
Check Version:
wp plugin get latepoint --field=version
Verify Fix Applied:
After update, confirm version is 5.2.6 or higher in plugin details.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to customer profile endpoints with script tags
- Administrator account activity from unexpected locations
Network Indicators:
- Inbound requests containing JavaScript payloads in form fields
SIEM Query:
source="wordpress.log" AND ("latepoint" OR "customer_profile") AND ("<script>" OR "javascript:")
🔗 References
- https://plugins.trac.wordpress.org/browser/latepoint/tags/5.2.5/lib/controllers/activities_controller.php
- https://plugins.trac.wordpress.org/browser/latepoint/tags/5.2.5/lib/models/activity_model.php
- https://plugins.trac.wordpress.org/browser/latepoint/tags/5.2.5/lib/views/activities/view.php#L27
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3449263%40latepoint%2Ftrunk&old=3408660%40latepoint%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/22bcfd36-ecf9-4d2c-ac94-94ffa0340c4c?source=cve