LatePoint WordPress Plugin CVE-2025-7052: Brief Summary of a Critical CSRF Vulnerability

This post provides a brief summary of CVE-2025-7052, a critical Cross-Site Request Forgery vulnerability affecting the LatePoint WordPress plugin up to version 5.1.94. The summary covers technical details, affected versions, and the vendor's security history.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-09-30

LatePoint WordPress Plugin CVE-2025-7052: Brief Summary of a Critical CSRF Vulnerability
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Account takeovers and unauthorized password resets have immediate business impact for any organization using WordPress for appointment scheduling. The LatePoint plugin, active on over 7,000 WordPress sites, is a central scheduling solution for healthcare, services, and education providers. Its wide adoption and integration with customer data make vulnerabilities in LatePoint especially significant for the WordPress ecosystem.

Technical Information

CVE-2025-7052 is a Cross-Site Request Forgery vulnerability in the LatePoint WordPress plugin, affecting all versions up to and including 5.1.94. The root cause is missing nonce validation in the change_password() function of the customer_cabinet__change_password AJAX route. This function is implemented in the OsCustomerCabinetController class. The endpoint is registered with both wp_ajax and wp_ajax_nopriv, which means it is accessible to both authenticated and unauthenticated users. However, the function does not check for a valid WordPress nonce or user capabilities before processing the password change request.

This design flaw allows an attacker to craft a CSRF payload (for example, a hidden form or JavaScript on a malicious site) that submits a password change request on behalf of a logged-in user. When the victim visits the attacker's site while authenticated to the vulnerable WordPress instance, the browser automatically includes the session cookies, and the password is reset without the user's knowledge or consent. If the "WP users as customers" setting is enabled, this can also affect WordPress administrator accounts.

The vulnerability is classified as CWE-352 (Cross-Site Request Forgery). The relevant code can be reviewed at the following public sources:

Affected Systems and Versions

  • Product: LatePoint WordPress plugin
  • Affected versions: All versions up to and including 5.1.94
  • Vulnerable configuration: All sites with LatePoint <= 5.1.94. Sites with "WP users as customers" enabled are at higher risk, as administrator accounts can be targeted.

Vendor Security History

LatePoint has experienced multiple critical vulnerabilities in recent years. In 2024, unauthenticated authentication bypass and arbitrary password change vulnerabilities were reported (see Wordfence 2024 advisory). The vendor has generally responded with timely patches, but the recurrence of basic security issues such as missing nonce validation and improper access controls indicates persistent gaps in secure development practices and code review.

References

Detect & fix
what others miss