Impact
The LatePoint calendar booking plugin for WordPress contains a flaw that allows attackers to change a logged‑in user's password without authentication. The change_password() AJAX route lacks nonce verification and capability checks, enabling a CSRF attack that can lead to account takeover. The vulnerability conforms to CWE‑352.
Affected Systems
Affected versions of the LatePoint plugin up to and including 5.1.94. The plugin is a WordPress add‑on used for booking appointments and events. All users installing these versions are exposed, including customers and site administrators when the 'WP users as customers' setting is enabled.
Risk and Exploitability
The CVSS score of 8.8 marks this as a high‑severity flaw. The EPSS score of less than 1% suggests the likelihood of exploitation in the near term is low, and the vulnerability is not currently listed in the CISA KEV catalog. However, because the attack can be triggered by a simple forged request and does not require advanced skills, the potential impact remains significant. An attacker who can lure a logged‑in user to a crafted URL can immediately reset the password and take over the account.
OpenCVE Enrichment
EUVD