CVE-2026-7332: WordPress LatePoint Plugin XSS Flaw Exposes Unauthenticated Attackers
The National Vulnerability Database has identified CVE-2026-7332, a critical stored Cross-Site Scripting (XSS) vulnerability in the LatePoint – Calendar Booking Plugin for Appointments and Events for WordPress. Affecting all versions up to 5.5.0, this flaw stems from insufficient input sanitization and output escaping in the ‘booking_form_page_url’ parameter. Unauthenticated attackers can exploit this to inject malicious scripts that execute when a user visits a compromised page, posing a significant risk to site visitors.
The exploitation vector is particularly concerning as it does not require a fully configured Stripe payment integration. The National Vulnerability Database notes that the plugin logs malicious activity even when Stripe is not set up, because a key action hook fires before Stripe Connect account ID validation. This bypass significantly lowers the barrier to entry for attackers seeking to leverage this vulnerability.
Defenders should prioritize patching this vulnerability immediately. For organizations running the LatePoint plugin, upgrading to the latest version is paramount. Given the unauthenticated nature of the exploit and the low technical bar, assume compromise is possible if unpatched. Audit logs for any suspicious script injections or unauthorized booking activities.
What This Means For You
- If your organization uses the LatePoint booking plugin on WordPress, patch to the latest version immediately. This vulnerability, CVE-2026-7332, allows unauthenticated attackers to inject scripts, potentially leading to session hijacking or credential theft by simply tricking a user into visiting a page with the injected script.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7332: WordPress LatePoint Plugin Stored XSS via booking_form_page_url
title: CVE-2026-7332: WordPress LatePoint Plugin Stored XSS via booking_form_page_url
id: scw-2026-05-06-ai-1
status: experimental
level: high
description: |
This rule detects attempts to exploit CVE-2026-7332 in the WordPress LatePoint plugin. It specifically looks for requests to 'admin-ajax.php' with the 'latepoint_save_booking_form' action and a 'booking_form_page_url' parameter containing potential XSS payloads like '<script>', 'alert(', or 'onerror='. This indicates an unauthenticated attacker attempting to inject malicious scripts into the plugin's booking forms.
author: SCW Feed Engine (AI-generated)
date: 2026-05-06
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7332/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-uri-query|contains:
- 'action=latepoint_save_booking_form'
cs-uri-query|contains:
- 'booking_form_page_url='
selection_indicators:
cs-uri-query|contains:
- '<script>'
cs-uri-query|contains:
- 'alert('
cs-uri-query|contains:
- 'onerror='
condition: selection AND selection_indicators
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7332 | Vulnerability | CVE-2026-7332 |
| CVE-2026-7332 | Affected Product | all |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 06, 2026 at 11:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.