<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-7448 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7448/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 08:16:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7448/feed.xml" rel="self" type="application/rss+xml"/><item><title>LatePoint WordPress Plugin Vulnerable to Stored XSS (CVE-2026-7448)</title><link>https://feed.craftedsignal.io/briefs/2026-05-latepoint-xss/</link><pubDate>Wed, 06 May 2026 08:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-latepoint-xss/</guid><description>The LatePoint WordPress plugin is vulnerable to stored cross-site scripting (XSS) via the 'first_name' parameter, affecting versions up to 5.5.0, allowing unauthenticated attackers to inject malicious scripts.</description><content:encoded><![CDATA[<p>CVE-2026-7448 identifies a stored cross-site scripting (XSS) vulnerability in the LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress. The vulnerability exists due to insufficient input sanitization and output escaping of the &lsquo;first_name&rsquo; parameter. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code into the WordPress site. Successful exploitation of this vulnerability enables attackers to execute malicious scripts in a user&rsquo;s browser when they access the affected page. This can lead to session hijacking, defacement of the website, or redirection to malicious sites. All versions of the LatePoint plugin up to and including 5.5.0 are affected.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious request containing JavaScript code in the <code>first_name</code> parameter.</li>
<li>The attacker sends the crafted request to the WordPress server hosting the vulnerable LatePoint plugin.</li>
<li>The LatePoint plugin processes the request without proper sanitization of the <code>first_name</code> parameter.</li>
<li>The unsanitized input is stored in the WordPress database.</li>
<li>A user accesses a page that displays the stored data from the <code>first_name</code> field.</li>
<li>The malicious JavaScript code is executed in the user&rsquo;s browser.</li>
<li>The attacker can potentially steal cookies, redirect the user to a malicious website, or deface the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a variety of negative consequences, including account compromise, defacement of the website, and the potential spread of malware to users. The vulnerability affects all users of the LatePoint plugin up to version 5.5.0. Given the popularity of WordPress and the LatePoint plugin, a large number of websites are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LatePoint – Calendar Booking Plugin for Appointments and Events to a version greater than 5.5.0 to patch CVE-2026-7448.</li>
<li>Deploy the Sigma rule <code>Detect LatePoint XSS Attempt</code> to your SIEM to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing JavaScript code in the <code>first_name</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>xss</category><category>cve-2026-7448</category></item></channel></rss>