{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T11:23:53.169","vulnerabilities":[{"cve":{"id":"CVE-2024-2472","sourceIdentifier":"security@wordfence.com","published":"2024-06-14T10:15:09.403","lastModified":"2026-04-08T18:21:06.270","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The LatePoint Plugin plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'start_or_use_session_for_customer' function in all versions up to and including 4.9.9. This makes it possible for unauthenticated attackers to view other customer's cabinets, including the ability to view PII such as email addresses and to change their LatePoint user password, which may or may not be associated with a WordPress account."},{"lang":"es","value":"El complemento LatePoint Plugin para WordPress es vulnerable al acceso no autorizado a los datos y a su modificación debido a una falta de verificación de capacidad en la función 'start_or_use_session_for_customer' en todas las versiones hasta la 4.9.9 incluida. Esto hace posible que atacantes no autenticados vean los gabinetes de otros clientes, incluida la capacidad de ver PII, como direcciones de correo electrónico, y cambiar su contraseña de usuario de LatePoint, que puede estar asociada o no con una cuenta de WordPress."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.9.91","matchCriteriaId":"75F8EEAD-23DD-4963-AD95-5FAE483DD933"}]}]}],"references":[{"url":"https://aramhairchitects.nl/","source":"security@wordfence.com","tags":["Not Applicable"]},{"url":"https://websec.nl/blog/critical-idor-vulnerability-in-latepoint-plugin-exposes-sensitive-data-666b78446e63d6dcdb0f73bf","source":"security@wordfence.com"},{"url":"https://wpdocs.latepoint.com/changelog/","source":"security@wordfence.com","tags":["Product","Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/6215fa9f-06bc-4dc8-b1f5-a3bb75749f1d?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://aramhairchitects.nl/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://wpdocs.latepoint.com/changelog/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Release Notes"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/6215fa9f-06bc-4dc8-b1f5-a3bb75749f1d?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}