CVE-2026-7332: XSS in LatePoint Calendar Booking Plugin
プラットフォーム
wordpress
コンポーネント
latepoint
修正版
5.5.1
CVE-2026-7332 describes a Stored Cross-Site Scripting (XSS) vulnerability discovered in the LatePoint – Calendar Booking Plugin for Appointments and Events WordPress plugin. This vulnerability allows unauthenticated attackers to inject arbitrary web scripts, potentially compromising user accounts and website functionality. The issue affects versions of the plugin up to and including 5.5.0, and a patch is available in version 5.5.1.
このCVEがあなたのプロジェクトに影響するか確認
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
影響と攻撃シナリオ翻訳中…
Successful exploitation of CVE-2026-7332 allows an attacker to inject malicious JavaScript code into pages accessible through the LatePoint plugin. When a user visits an affected page, the injected script executes within their browser context, granting the attacker the ability to steal cookies, redirect users to phishing sites, or deface the website. The stored nature of the vulnerability means the malicious script persists until the affected parameter is properly sanitized, allowing for repeated exploitation. This could lead to widespread compromise of user data and website integrity, similar to other XSS attacks targeting WordPress plugins.
悪用の状況翻訳中…
CVE-2026-7332 was published on May 5, 2026. Its severity is rated HIGH with a CVSS score of 7.2. There is no indication of this vulnerability being actively exploited in the wild or listed on KEV. Public proof-of-concept (POC) code is not currently available, but the vulnerability's nature makes it likely that a POC will be developed and shared publicly.
脅威インテリジェンス
エクスプロイト状況
EPSS
0.21% (44% パーセンタイル)
CISA SSVC
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
- Attack Complexity
- 低 — 特別な条件不要。安定して悪用可能。
- Privileges Required
- なし — 認証不要。資格情報なしで悪用可能。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化あり — 攻撃が脆弱なコンポーネントを超えて他のシステムに波及可能。
- Confidentiality
- 低 — 一部データへの部分的アクセス。
- Integrity
- 低 — 限定的な範囲でデータ変更可能。
- Availability
- なし — 可用性への影響なし。
影響を受けるソフトウェア
弱点分類 (CWE)
タイムライン
- 予約済み
- 公開日
- 更新日
- EPSS 更新日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2026-7332 is to immediately upgrade the LatePoint – Calendar Booking Plugin to version 5.5.1 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to filter requests containing suspicious characters in the 'bookingformpageurl' parameter. Additionally, review and sanitize any user-supplied input used in constructing URLs within the plugin. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple JavaScript payload through the 'bookingformpageurl' parameter and verifying that it does not execute.
修正方法
バージョン 5.5.1 以上、または新しい修正バージョンにアップデートしてください
よくある質問翻訳中…
What is CVE-2026-7332 — XSS in LatePoint Calendar Booking Plugin?
CVE-2026-7332 is a Stored Cross-Site Scripting (XSS) vulnerability in the LatePoint plugin for WordPress, allowing attackers to inject malicious scripts via the 'bookingformpage_url' parameter. It impacts versions up to 5.5.0 and carries a HIGH severity rating.
Am I affected by CVE-2026-7332 in LatePoint Calendar Booking Plugin?
You are affected if your WordPress website uses the LatePoint plugin and is running version 5.5.0 or earlier. Check your plugin version immediately using wp plugin list.
How do I fix CVE-2026-7332 in LatePoint Calendar Booking Plugin?
Upgrade the LatePoint plugin to version 5.5.1 or later. If immediate upgrade isn't possible, consider a WAF rule to filter suspicious URL parameters as a temporary mitigation.
Is CVE-2026-7332 being actively exploited?
There is currently no public evidence of CVE-2026-7332 being actively exploited in the wild, but the vulnerability's nature makes it a potential target.
Where can I find the official LatePoint advisory for CVE-2026-7332?
Refer to the official LatePoint plugin website or WordPress plugin repository for the latest advisory and update information regarding CVE-2026-7332.
このCVEがあなたのプロジェクトに影響するか確認
依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。
WordPressプロジェクトを今すぐスキャン — アカウント不要
Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.
依存関係ファイルをドラッグ&ドロップ
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...