LatePoint Plugin <= 4.9.9 - Missing Authorization and Sensitive Information Exposure via IDOR
The LatePoint Plugin plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'start_or_use_session_for_customer' function in all versions up to and including 4.9.9. This makes it possible for unauthenticated attackers to view other customer's cabinets, including the ability to view PII such as email addresses and to change their LatePoint user password, which may or may not be associated with a WordPress account.
CVE-2024-2472 is a critical severity with CVSS 9.1 Sensitive Information Exposure issue affecting the Plugin LatePoint Plugin. It affects Versions up to 4.9.9 and is fixed in 4.9.9.1.
CVE-2024-2472 is tracked for the Plugin LatePoint Plugin as critical severity with CVSS 9.1. The affected range is Versions up to 4.9.9. Update LatePoint Plugin to 4.9.9.1 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
latepoint
View on wordpress.org
|
| CVE | CVE-2024-2472 |
| Patched Versions |
4.9.9.1
|
| Affected Versions |
Versions up to 4.9.9
|
Related CVEs for LatePoint Plugin
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
LatePoint <= 5.1.93 - Unauthenticated Local File Inclusion
LatePoint <= 5.0.12 - Authentication Bypass
LatePoint <= 5.0.11 - Unauthenticated Arbitrary User Password Change via SQL Injection
LatePoint <= 5.2.7 - Authenticated (Agent+) Privilege Escalation
LatePoint <= 5.1.94 - Cross-Site Request Forgery to Account Takeover via change_password() Function
LatePoint <= 5.1.94 - Unauthenticated Authentication Bypass via load_step Function
LatePoint – Calendar Booking Plugin for Appointments and Events <= 5.2.5 - Unauthenticated Stored Cross-Site Scripting
LatePoint <= 5.2.7 - Authenticated (Administrator+) SQL Injection via JSON Import
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more