Skip to content

Instantly share code, notes, and snippets.

@alon710
Created March 11, 2026 10:10
Show Gist options
  • Select an option

  • Save alon710/870b156784b0369c0a4c65c70b2fd6b2 to your computer and use it in GitHub Desktop.

Select an option

Save alon710/870b156784b0369c0a4c65c70b2fd6b2 to your computer and use it in GitHub Desktop.
CVE-2026-1566: CVE-2026-1566: Privilege Escalation via Improper Authorization in LatePoint WordPress Plugin - CVE Security Report

CVE-2026-1566: CVE-2026-1566: Privilege Escalation via Improper Authorization in LatePoint WordPress Plugin

CVSS Score: 8.8 Published: 2026-03-02 Full Report: https://cvereports.com/reports/CVE-2026-1566

Summary

CVE-2026-1566 is a high-severity privilege escalation vulnerability in the LatePoint WordPress plugin affecting versions 5.2.7 and earlier. Authenticated attackers with Agent privileges can manipulate the wordpress_user_id parameter during customer creation to link their account to an administrator, enabling full site takeover via password reset mechanisms.

TL;DR

Authenticated Agent users in LatePoint <= 5.2.7 can escalate to Administrator by linking a customer record to an admin's WordPress ID and executing a password reset.

Exploit Status: POC

Technical Details

  • CVSS v3.1 Score: 8.8 (High)
  • CWE ID: CWE-269
  • Attack Vector: Network
  • Privileges Required: Low (LatePoint Agent)
  • Impact: Privilege Escalation to Administrator
  • Exploit Status: Proof of Concept Available
  • KEV Status: Not Listed
  • EPSS Score: 0.04%

Affected Systems

  • WordPress installations running LatePoint Plugin versions 5.2.7 and earlier.
  • LatePoint Plugin: <= 5.2.7 (Fixed in: 5.2.8)

Mitigation

  • Update LatePoint plugin to version 5.2.8 or higher.
  • Implement Web Application Firewall (WAF) rules to inspect and block unauthorized modifications to the wordpress_user_id parameter.
  • Enforce principle of least privilege for LatePoint Agent accounts, restricting access strictly to necessary personnel.

Remediation Steps:

  1. Log into the WordPress administrative dashboard with Administrator privileges.
  2. Navigate to the Plugins section and check for available updates.
  3. Locate the LatePoint plugin and execute the update process to install version 5.2.8.
  4. Query the database to identify any LatePoint customer records associated with administrative WordPress IDs.
  5. Reset passwords for any administrative accounts identified as potentially compromised during the audit.

References


Generated by CVEReports - Automated Vulnerability Intelligence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment