CVE-2026-6741 High ยท CVSS 8.8 Calendar Booking Plugin for Appointments and Events Privilege Escalation

CVE-2026-6741: Calendar Booking Plugin for Appointments and Events vulnerability โ€” full analysis & how to protect

Critical security flaw in Calendar Booking Plugin for Appointments and Events on WordPress sites. Severity: High (CVSS 8.8). Published 2026-04-27. Full technical breakdown, who is at risk, and exact mitigation steps.

๐Ÿ“… 2026-04-27 โฑ 5 min read ๐Ÿ›ก GuardLabs
8.8
CVSS v3
High
Severity
2026-04-27
Published
Privilege Escalation
Class

TL;DR โ€” what you need to know

A high-severity vulnerability exists in the LatePoint booking plugin for WordPress. This flaw allows a low-privileged user, such as an 'agent', to take complete control of your website by resetting an administrator's password. If you use this plugin, your site is at high risk for a full takeover. You must update the plugin to a patched version immediately.

Technical analysis

The LatePoint โ€“ Calendar Booking Plugin for Appointments and Events, in versions up to and including 5.4.1, is vulnerable to Privilege Escalation (CVE-2026-6741). The vulnerability is classified as High severity with a CVSS score of 8.8. The core of the issue lies within the plugin's access control mechanisms, specifically a missing authorization check that allows a low-privileged user to gain administrative control over the entire WordPress site.

The exploitation path requires an attacker to be authenticated with a role that possesses the customer__edit capability, which is granted to the latepoint_agent role by default. The vulnerability is located in the execute() method corresponding to the connect-customer-to-wp-user ability. This function fails to validate whether the target WordPress user ID, to which a LatePoint customer record is being linked, belongs to a privileged user like an administrator. An attacker can abuse this flaw by providing the user ID of a site administrator. Once the LatePoint customer record is successfully linked to the administrator's WordPress account, the attacker can then leverage the standard customer-facing password reset functionality. This action triggers a password reset for the linked WordPress administrator account, not just the customer profile, allowing the attacker to set a new password and log in as the administrator.

The root cause is a specific authorization bypass due to the missing check on the target user's role or capabilities. The function correctly verifies that the attacking user has the customer__edit capability but incorrectly assumes this is sufficient for an operation that can modify the authentication credentials of any user on the site, including privileged ones. This oversight allows an authenticated attacker to cross a significant security boundary, escalating from a limited-access agent role to a full administrator, resulting in a complete site compromise. The specific endpoint or parameters used in the attack are not specified in the public disclosure.

Who is at risk

This vulnerability affects any WordPress site using the LatePoint โ€“ Calendar Booking Plugin for Appointments and Events in versions up to and including 5.4.1. This plugin is commonly used by businesses that rely on appointment scheduling, such as medical clinics, salons, consultants, coaches, and other service-based professionals. The user base typically includes organizations that need to manage customer bookings and staff schedules directly through their website.

The risk is most acute for websites that have multiple user accounts and utilize the built-in latepoint_agent role for staff members or contractors. In these multi-user environments, any user with agent-level permissions becomes a potential vector for a full site takeover. Sites where agents are not fully trusted administrators are at the highest risk, as the vulnerability's premise is the escalation of a limited, non-administrative role. While a single-user site where the only user is an administrator is theoretically less exposed, the vulnerability remains critical and should be patched immediately to prevent exploitation should an attacker find another way to gain agent-level access.

๐Ÿ” Check your site in 60 seconds

Free instant audit โ€” we scan for this CVE and 50+ other vulnerabilities, no signup required.

Run free audit 24/7 automated scanner

How to mitigate

The following steps are recommended to mitigate the risk from CVE-2026-6741 and secure your WordPress site:

  1. Update Immediately: The most critical and effective step is to update the LatePoint plugin to a patched version. The vulnerability is fixed in versions after 5.4.1. Navigate to your WordPress dashboard, go to the 'Plugins' section, and apply the update as soon as it is available. Do not delay this action.
  2. Backup Your Site First: Before performing any update, it is essential to create a complete backup of your website's files and database. This ensures that you can restore your site to its previous state if the update process encounters any issues.
  3. Temporary Measures if Update is Delayed: If you are unable to update the plugin immediately, the safest alternative is to deactivate and delete the plugin from your site until you can apply the patch. As a less severe but also less complete measure, you could audit all user accounts and remove any non-administrator users from the latepoint_agent role. A properly configured Web Application Firewall (WAF) might be able to block exploitation attempts if a rule is crafted to target the specific vulnerable action, but this requires technical expertise and may not be fully effective without precise details of the attack vector.
  4. Automated Vulnerability Scanning: To maintain ongoing security, employ a vulnerability scanning solution. Security services, including third-party scanners or plugins like the GuardLabs Web-Audit Guardian, can help automatically detect outdated software, missing patches, and known vulnerabilities. Regular scanning helps ensure you are alerted to risks like this in a timely manner.

๐Ÿ›ก๏ธ GuardLabs Care โ€” we handle this for you

$240/year: managed WordPress hosting + SSL + 24/7 monitoring + automatic plugin updates with rollback + uptime alerts. We patch CVEs the same day they drop.

View Care plans

Frequently asked questions

What is the immediate risk of CVE-2026-6741?

The immediate risk is a full site takeover. An attacker with a low-level 'agent' account can escalate their privileges to become a site administrator, giving them complete control over your website.

Which versions of the LatePoint plugin are affected?

All versions of the LatePoint โ€“ Calendar Booking Plugin for Appointments and Events up to and including version 5.4.1 are vulnerable. You should update to a version higher than this as soon as possible.

Is my site safe if I'm the only user and have no 'agents'?

While the primary attack vector requires an attacker to have an 'agent' role, it is still critical to update. A high-severity vulnerability should be patched regardless of your site's current user configuration to eliminate the risk entirely.

How does the attacker take over the site?

The attacker uses a feature to link a customer profile to a WordPress user. Due to a flaw, they can link a profile to an administrator's account and then use the standard password reset function to change the administrator's password.

What should I do if I cannot update the plugin right away?

If you cannot update immediately, the safest course of action is to disable and deactivate the LatePoint plugin until you can apply the patch. You should also consider temporarily removing any users with the 'latepoint_agent' role.

Disclosure timeline

๐Ÿ“Œ This page is informational. We track CVEs from public NVD feeds and summarize them in plain language. Always verify on the original CVE record (NVD link below) and consult the plugin vendor for official patch info. This is not legal or compliance advice.

References

https://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.1/lib/abilities/customers/connect-customer-to-wp-user.phphttps://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.1/lib/helpers/roles_helper.phphttps://plugins.trac.wordpress.org/browser/latepoint/tags/5.4.1/lib/models/customer_model.phphttps://plugins.trac.wordpress.org/changeset/3514330/latepointhttps://wordpress.org/plugins/latepoint/https://www.wordfence.com/threat-intel/vulnerabilities/id/71e99412-031e-4f4a-9126-dd3a37975246?source=cve