CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-1566
8.80.04%

CVE-2026-1566: Privilege Escalation via Improper Authorization in LatePoint WordPress Plugin

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 11, 2026·7 min read·7 visits

PoC Available

Executive Summary (TL;DR)

Authenticated Agent users in LatePoint <= 5.2.7 can escalate to Administrator by linking a customer record to an admin's WordPress ID and executing a password reset.

CVE-2026-1566 is a high-severity privilege escalation vulnerability in the LatePoint WordPress plugin affecting versions 5.2.7 and earlier. Authenticated attackers with Agent privileges can manipulate the wordpress_user_id parameter during customer creation to link their account to an administrator, enabling full site takeover via password reset mechanisms.

Vulnerability Overview

CVE-2026-1566 is a high-severity privilege escalation vulnerability located in the LatePoint – Calendar Booking Plugin for Appointments and Events for WordPress. The vulnerability affects all versions of the plugin up to and including version 5.2.7. It allows authenticated users with low-level privileges, specifically those assigned the "LatePoint Agent" role, to escalate their privileges to the Administrator level. This results in a complete compromise of the underlying WordPress installation.

The vulnerable component is the customer management module within the LatePoint Agent dashboard. LatePoint Agents are responsible for managing bookings, schedules, and customer records. The plugin exposes specific endpoints and administrative functions to allow Agents to create or update these customer records. The vulnerability exists within the input validation and authorization logic of these specific functions.

This flaw is classified under CWE-269: Improper Privilege Management. The plugin fails to verify if the authenticated Agent has the necessary permissions to assign arbitrary WordPress user IDs to customer profiles. By exploiting this lack of validation, an attacker can manipulate database relationships, linking a low-privileged customer record to a highly privileged WordPress core account.

Root Cause Analysis

The root cause of CVE-2026-1566 lies in the insecure handling of the wordpress_user_id parameter during the customer creation and modification processes. The LatePoint plugin uses this specific parameter to establish a relationship between a LatePoint customer entity and a standard WordPress user account. This linkage allows customers to log into the WordPress site using native authentication mechanisms while interacting with LatePoint's booking interfaces.

When a LatePoint Agent submits a request to create or update a customer, the backend application processes the incoming HTTP POST request and extracts various parameters, including the wordpress_user_id. In vulnerable versions of the plugin, the code fails to implement adequate authorization checks on this specific field. The application assumes that any data submitted by an authenticated Agent is legitimate and permissible for that user role.

Because the authorization boundary is missing, the application processes the user-supplied wordpress_user_id value without validating whether the Agent holds the authority to associate the customer with that specific WordPress account. The database operation executes, writing the attacker-controlled value into the mapping table. This direct object reference flaw creates a condition where an Agent can intentionally map a customer profile they control to an administrator account, such as the default administrator with user ID 1.

Code and Patch Analysis

The vulnerability exists in the plugin's customer data saving routine, which processes array inputs directly into database columns. The vulnerable implementation retrieves the POST payload and iteratively maps keys to database fields. If the wordpress_user_id key is present in the request, the application assigns its value to the customer object and persists it to the database. No conditional logic verifies the current user's capability against the target wordpress_user_id.

The official remediation was introduced in changeset 3463945 and released in version 5.2.8. The patch introduces strict authorization checks before allowing modifications to the wordpress_user_id field. The updated logic explicitly validates the capabilities of the user initiating the request.

The patched code implements a verification function that checks if the currently authenticated user has the manage_options capability (or an equivalent high-level administrative capability) before processing the wordpress_user_id assignment. If the user lacks the required privileges, the application drops the parameter from the input array or terminates the transaction, successfully mitigating the improper privilege management vulnerability.

Exploitation Mechanism

Exploitation of CVE-2026-1566 requires the attacker to hold an active, authenticated session with "LatePoint Agent" privileges on the target WordPress application. The attacker navigates to the customer management interface and initiates a request to create a new customer. Using an interception proxy, the attacker captures the outgoing HTTP POST request and appends or modifies the wordpress_user_id parameter, setting its value to 1 (the typical ID of the primary administrator).

The application processes the malicious payload and stores the relationship. The attacker then utilizes LatePoint's built-in customer portal to initiate a password reset for the newly created customer account. Because the customer record is now explicitly linked to the WordPress administrator account, the plugin's password reset routine queries the database for the associated WordPress user ID and updates the password for that account.

The attacker receives the password reset token or directly sets the new password, depending on the plugin's specific reset flow. With the administrator's password successfully changed, the attacker logs into the standard WordPress administrative panel (/wp-admin) using the new credentials. This grants the attacker full administrative control over the application.

Impact Assessment

The security impact of CVE-2026-1566 is severe, resulting in a complete compromise of the confidentiality, integrity, and availability of the affected WordPress site. By successfully executing the exploit, the attacker gains full administrative access. This allows the attacker to read all sensitive data stored in the database, including customer PII, internal booking schedules, and site configuration details.

From an integrity perspective, the attacker can modify any content, inject malicious scripts into pages, install rogue plugins, or alter core application files. This level of access frequently leads to the deployment of persistent backdoors, ensuring the attacker maintains access even if the initial vulnerability is subsequently patched. The availability of the system is equally compromised, as the attacker possesses the necessary privileges to delete the entire site, disrupt services, or repurpose the underlying server infrastructure for secondary attacks.

The CVSS v3.1 vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, resulting in a base score of 8.8. The attack requires low privileges and no user interaction, making it highly exploitable by malicious insiders or external actors who have compromised a low-privileged account. Given that the LatePoint plugin has over 100,000 active installations, this vulnerability presents a significant risk to a large number of organizations.

Remediation and Mitigation

The definitive remediation for CVE-2026-1566 is to upgrade the LatePoint plugin to version 5.2.8 or later. Site administrators must apply this update immediately to neutralize the privilege escalation vector. The update contains the necessary structural changes to the authorization logic, preventing low-privileged users from manipulating the wordpress_user_id parameter.

Administrators must also conduct a post-incident forensic review to identify potential prior exploitation. This involves auditing the wp_users and LatePoint customer database tables. Security personnel should search for any LatePoint customer records that are linked to highly privileged WordPress accounts (such as Administrators or Editors) that do not have a legitimate business reason for such an association.

If anomalous linkages are discovered, administrators should immediately terminate the affected user sessions, reset the passwords for all administrative accounts, and review the server logs for indicators of post-exploitation activity. Organizations that cannot immediately apply the patch should deploy Web Application Firewall (WAF) rules configured to inspect incoming HTTP POST requests to the LatePoint customer endpoints, blocking any requests from non-administrative users that contain the wordpress_user_id parameter.

Official Patches

WordPressOfficial WordPress plugin repository changeset containing the fix.

Technical Appendix

CVSS Score
8.8/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
0.04%

Affected Systems

WordPress installations running LatePoint Plugin versions 5.2.7 and earlier.

Affected Versions Detail

Product
Affected Versions
Fixed Version
LatePoint Plugin
LatePoint
<= 5.2.75.2.8
AttributeDetail
CVSS v3.1 Score8.8 (High)
CWE IDCWE-269
Attack VectorNetwork
Privileges RequiredLow (LatePoint Agent)
ImpactPrivilege Escalation to Administrator
Exploit StatusProof of Concept Available
KEV StatusNot Listed
EPSS Score0.04%

MITRE ATT&CK Mapping

T1068Exploitation for Privilege Escalation
Privilege Escalation
CWE-269
Improper Privilege Management

The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Vulnerability Timeline

Vulnerability disclosed and published to the CVE List.
2026-03-02
Detailed advisories released by Wordfence, Wiz, and SentinelOne.
2026-03-03
NVD analysis completed with a CVSS score of 8.8.
2026-03-03

References & Sources

  • [1]Wordfence Intelligence Advisory
  • [2]SentinelOne Vulnerability Database
  • [3]NVD Record
  • [4]Wiz Vulnerability Analysis

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.