CVE-2025-6815

5.5 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the LatePoint WordPress plugin allows authenticated administrators to inject malicious scripts into website pages. The injected scripts execute whenever users visit compromised pages, potentially leading to session hijacking or malware distribution. Only WordPress multi-site installations and sites with unfiltered_html disabled are affected.

💻 Affected Systems

Products:
  • LatePoint – Calendar Booking Plugin for Appointments and Events
Versions: All versions up to and including 5.1.94
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ✅ No
Notes: Only affects WordPress multi-site installations and installations where unfiltered_html capability is disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, redirect users to malicious sites, install backdoors, or deface the website.

🟠

Likely Case

Attackers with compromised admin accounts inject malicious scripts to steal user session cookies or display unwanted content.

🟢

If Mitigated

With proper input validation and output escaping, no script injection occurs and user data remains protected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires administrator-level access to WordPress, making exploitation more difficult than unauthenticated vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.1.94

Vendor Advisory: https://wordpress.org/plugins/latepoint/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find LatePoint plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Enable unfiltered_html capability

WordPress

Enable the unfiltered_html capability for administrators, which prevents this vulnerability from being exploitable.

Add to wp-config.php: define('DISALLOW_UNFILTERED_HTML', false);

Disable plugin

WordPress

Temporarily disable the LatePoint plugin until patched.

Navigate to WordPress admin → Plugins → Installed Plugins → LatePoint → Deactivate

🧯 If You Can't Patch

  • Implement strict access controls for administrator accounts and enable multi-factor authentication.
  • Deploy a web application firewall (WAF) with XSS protection rules and monitor for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → LatePoint version. If version is 5.1.94 or lower, you are vulnerable.

Check Version:

wp plugin list --name=latepoint --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify LatePoint plugin version is higher than 5.1.94 in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin-ajax.php with service[name] parameter containing script tags
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Unexpected JavaScript in HTTP responses from booking pages
  • External script loads from unusual domains

SIEM Query:

source="wordpress" AND (url="*admin-ajax.php*" AND post_data="*service[name]*")

🔗 References

📤 Share & Export