<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-7332 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7332/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7332/feed.xml" rel="self" type="application/rss+xml"/><item><title>LatePoint WordPress Plugin Stored XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-latepoint-xss/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-latepoint-xss/</guid><description>The LatePoint WordPress plugin is vulnerable to stored XSS via the booking_form_page_url parameter, allowing unauthenticated attackers to inject arbitrary web scripts in pages that execute when a user accesses the injected page.</description><content:encoded><![CDATA[<p>The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is susceptible to a stored cross-site scripting (XSS) vulnerability. This flaw, identified as CVE-2026-7332, exists in all versions up to and including 5.5.0. Unauthenticated attackers can exploit this vulnerability by injecting malicious web scripts into the &lsquo;booking_form_page_url&rsquo; parameter. This vulnerability does not require Stripe to be configured. Successful exploitation allows attackers to execute arbitrary JavaScript code in the context of a user&rsquo;s browser when they access a page containing the injected script. This can lead to account compromise, data theft, or other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious URL containing a JavaScript payload in the <code>booking_form_page_url</code> parameter.</li>
<li>The attacker submits the crafted URL to a WordPress page utilizing the vulnerable LatePoint plugin.</li>
<li>The LatePoint plugin fails to properly sanitize or escape the input provided in the <code>booking_form_page_url</code> parameter.</li>
<li>The malicious script is stored in the WordPress database, specifically within the plugin&rsquo;s settings or booking data.</li>
<li>A legitimate user accesses the WordPress page where the malicious script is stored and rendered.</li>
<li>The user&rsquo;s browser executes the attacker-injected JavaScript code.</li>
<li>The malicious script can perform actions such as stealing cookies, redirecting the user to a phishing site, or modifying page content.</li>
<li>The attacker gains control over the user&rsquo;s session or injects further malicious content into the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an unauthenticated attacker to execute arbitrary JavaScript code in a user&rsquo;s browser. The potential impact includes session hijacking, defacement of the website, redirection to malicious sites, or the theft of sensitive information such as user credentials and financial data. While the specific number of affected installations is unknown, the LatePoint plugin is actively installed on WordPress sites, representing a significant attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LatePoint – Calendar Booking Plugin for Appointments and Events to a version greater than 5.5.0 to patch CVE-2026-7332.</li>
<li>Deploy the Sigma rule <code>Detect LatePoint XSS Attempt via booking_form_page_url</code> to identify potential exploitation attempts by monitoring web server logs.</li>
<li>Review and sanitize existing data associated with the LatePoint plugin in the WordPress database for any injected malicious scripts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>stored-xss</category><category>cve-2026-7332</category><category>plugin</category></item></channel></rss>