Description
The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_caption' parameter in the [latepoint_resources] shortcode in versions up to and including 5.3.0. This is due to insufficient output escaping when the 'items' parameter is set to 'bundles'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2026-04-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting enabling arbitrary JavaScript execution on pages viewed by users
Action: Patch
AI Analysis

Impact

The vulnerability is a stored XSS that occurs through the button_caption parameter of the [latepoint_resources] shortcode when the items argument is set to bundles. It is present in LatePoint plugin versions up to and including 5.3.0. An attacker with contributor level or higher can inject malformed script payloads that are written to the post content and later rendered by the plugin. When a user visits a page containing the malicious shortcode, the injected script executes in that user’s browser, potentially facilitating session hijacking, data theft, defacement or malware delivery. This flaw is categorized as CWE‑79.

Affected Systems

The affected product is the LatePoint – Calendar Booking Plugin for Appointments and Events, a WordPress plugin. Versions 5.3.0 and older are vulnerable.

Risk and Exploitability

The CVSS score of 6.4 indicates moderate severity. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, suggesting it is not widely exploited yet. Exploitation requires an authenticated user with contributor role or higher; the attacker must be able to submit content containing the shortcode. Because the injected script runs for any site visitor that loads the affected page, the impact can be wide‑ranging, affecting confidentiality, integrity and availability of the site and its users. The attack vector is therefore an authenticated content injection attack that results in client‑side code execution.

Generated by OpenCVE AI on April 8, 2026 at 05:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the LatePoint plugin to the latest version (5.3.1 or newer) where the button_caption output is properly escaped.

Generated by OpenCVE AI on April 8, 2026 at 05:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Latepoint
Latepoint latepoint – Calendar Booking Plugin For Appointments And Events
Wordpress
Wordpress wordpress
Vendors & Products Latepoint
Latepoint latepoint – Calendar Booking Plugin For Appointments And Events
Wordpress
Wordpress wordpress

Wed, 08 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button_caption' parameter in the [latepoint_resources] shortcode in versions up to and including 5.3.0. This is due to insufficient output escaping when the 'items' parameter is set to 'bundles'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title LatePoint <= 5.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Latepoint Latepoint – Calendar Booking Plugin For Appointments And Events
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:33.655Z

Reserved: 2026-03-24T17:31:49.689Z

Link: CVE-2026-4785

cve-icon Vulnrichment

Updated: 2026-04-08T14:14:21.541Z

cve-icon NVD

Status : Deferred

Published: 2026-04-08T05:16:06.997

Modified: 2026-04-27T19:04:22.650

Link: CVE-2026-4785

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:44:01Z

Weaknesses