CVE-2026-1566: Privilege Escalation via Improper Authorization in LatePoint WordPress Plugin
Vulnerability ID: CVE-2026-1566
CVSS Score: 8.8
Published: 2026-03-02
CVE-2026-1566 is a high-severity privilege escalation vulnerability in the LatePoint WordPress plugin affecting versions 5.2.7 and earlier. Authenticated attackers with Agent privileges can manipulate the wordpress_user_id parameter during customer creation to link their account to an administrator, enabling full site takeover via password reset mechanisms.
TL;DR
Authenticated Agent users in LatePoint <= 5.2.7 can escalate to Administrator by linking a customer record to an admin's WordPress ID and executing a password reset.
⚠️ Exploit Status: POC
Technical Details
- CVSS v3.1 Score: 8.8 (High)
- CWE ID: CWE-269
- Attack Vector: Network
- Privileges Required: Low (LatePoint Agent)
- Impact: Privilege Escalation to Administrator
- Exploit Status: Proof of Concept Available
- KEV Status: Not Listed
- EPSS Score: 0.04%
Affected Systems
- WordPress installations running LatePoint Plugin versions 5.2.7 and earlier.
-
LatePoint Plugin: <= 5.2.7 (Fixed in:
5.2.8)
Mitigation Strategies
- Update LatePoint plugin to version 5.2.8 or higher.
- Implement Web Application Firewall (WAF) rules to inspect and block unauthorized modifications to the
wordpress_user_idparameter. - Enforce principle of least privilege for LatePoint Agent accounts, restricting access strictly to necessary personnel.
Remediation Steps:
- Log into the WordPress administrative dashboard with Administrator privileges.
- Navigate to the Plugins section and check for available updates.
- Locate the LatePoint plugin and execute the update process to install version 5.2.8.
- Query the database to identify any LatePoint customer records associated with administrative WordPress IDs.
- Reset passwords for any administrative accounts identified as potentially compromised during the audit.
References
- Wordfence Intelligence Advisory
- SentinelOne Vulnerability Database
- NVD Record
- Wiz Vulnerability Analysis
Read the full report for CVE-2026-1566 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)