LatePoint WordPress Plugin Vulnerable to Stored XSS (CVE-2026-7448)
The LatePoint WordPress plugin is vulnerable to stored cross-site scripting (XSS) via the 'first_name' parameter, affecting versions up to 5.5.0, allowing unauthenticated attackers to inject malicious scripts.
CVE-2026-7448 identifies a stored cross-site scripting (XSS) vulnerability in the LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress. The vulnerability exists due to insufficient input sanitization and output escaping of the ‘first_name’ parameter. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into the WordPress site. Successful exploitation of this vulnerability enables attackers to execute malicious scripts in a user’s browser when they access the affected page. This can lead to session hijacking, defacement of the website, or redirection to malicious sites. All versions of the LatePoint plugin up to and including 5.5.0 are affected.
Attack Chain
- An unauthenticated attacker crafts a malicious request containing JavaScript code in the
first_nameparameter. - The attacker sends the crafted request to the WordPress server hosting the vulnerable LatePoint plugin.
- The LatePoint plugin processes the request without proper sanitization of the
first_nameparameter. - The unsanitized input is stored in the WordPress database.
- A user accesses a page that displays the stored data from the
first_namefield. - The malicious JavaScript code is executed in the user’s browser.
- The attacker can potentially steal cookies, redirect the user to a malicious website, or deface the website.
Impact
Successful exploitation of this vulnerability can lead to a variety of negative consequences, including account compromise, defacement of the website, and the potential spread of malware to users. The vulnerability affects all users of the LatePoint plugin up to version 5.5.0. Given the popularity of WordPress and the LatePoint plugin, a large number of websites are potentially vulnerable.
Recommendation
- Upgrade the LatePoint – Calendar Booking Plugin for Appointments and Events to a version greater than 5.5.0 to patch CVE-2026-7448.
- Deploy the Sigma rule
Detect LatePoint XSS Attemptto your SIEM to detect potential exploitation attempts. - Monitor web server logs for suspicious requests containing JavaScript code in the
first_nameparameter.
Detection coverage 2
Detect LatePoint XSS Attempt
mediumDetects potential attempts to exploit the LatePoint plugin XSS vulnerability by identifying requests with JavaScript code in the 'first_name' parameter.
Detect LatePoint XSS Attempt - POST Method
mediumDetects potential attempts to exploit the LatePoint plugin XSS vulnerability via POST requests with JavaScript code in the 'first_name' parameter.
Detection queries are kept inside the platform. Get full rules →