Description
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to SQL Injection via the JSON Import in all versions up to, and including, 5.2.7 due to insufficient validation on the user-supplied JSON data. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary SQL queries on the database that can be used to extract information via time-based techniques, drop tables, or modify data.
Published: 2026-03-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database Manipulation and Information Disclosure
Action: Upgrade
AI Analysis

Impact

Authenticated administrators with access to the LatePoint JSON import feature can supply malformed JSON that bypasses server‑side validation. The plugin’s input sanitization flaw allows an attacker to inject arbitrary SQL statements, enabling the execution of time‑based queries, data extraction, table deletion, or data alteration. The impact is a compromise of database confidentiality, integrity, and availability within the WordPress site, limited to users with at least administrator privileges.

Affected Systems

LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress, versions 5.2.7 and earlier.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. EPSS is less than 1 % suggesting a very low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves an authenticated administrator using the JSON import interface; no external access or elevated privileges beyond the administrator role are required, and no public exploit has been reported in the provided references.

Generated by OpenCVE AI on April 15, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LatePoint to version 5.2.8 or newer
  • If upgrading is not immediately possible, restrict the JSON import functionality to the minimum set of trusted administrators and monitor import activity for suspicious patterns
  • Implement additional input validation on uploaded JSON files to enforce strict format and escape all user data before database queries

Generated by OpenCVE AI on April 15, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Latepoint
Latepoint latepoint – Calendar Booking Plugin For Appointments And Events
Wordpress
Wordpress wordpress
Vendors & Products Latepoint
Latepoint latepoint – Calendar Booking Plugin For Appointments And Events
Wordpress
Wordpress wordpress

Tue, 03 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to SQL Injection via the JSON Import in all versions up to, and including, 5.2.7 due to insufficient validation on the user-supplied JSON data. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary SQL queries on the database that can be used to extract information via time-based techniques, drop tables, or modify data.
Title LatePoint <= 5.2.7 - Authenticated (Administrator+) SQL Injection via JSON Import
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Latepoint Latepoint – Calendar Booking Plugin For Appointments And Events
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:02.092Z

Reserved: 2026-01-27T13:40:10.237Z

Link: CVE-2026-1487

cve-icon Vulnrichment

Updated: 2026-03-03T15:57:39.561Z

cve-icon NVD

Status : Deferred

Published: 2026-03-03T02:16:07.633

Modified: 2026-04-22T21:26:58.303

Link: CVE-2026-1487

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:00:07Z

Weaknesses