Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11204: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login

0
High
VulnerabilityCVE-2025-11204cvecve-2025-11204cwe-89
Published: Wed Oct 08 2025 (10/08/2025, 04:23:40 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login

Description

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 6.0.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. An unauthenticated attacker could utilize an injected Cross-Site Scripting via user-agent on form submission to leverage this to achieve Reflected Cross-Site Scripting.

AI-Powered Analysis

AILast updated: 10/08/2025, 05:01:47 UTC

Technical Analysis

CVE-2025-11204 is a vulnerability classified under CWE-89 (SQL Injection) found in the WordPress plugin RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login. The flaw exists in all versions up to and including 6.0.6.2, caused by insufficient escaping and lack of prepared statements when handling user-supplied parameters in SQL queries. Authenticated attackers with administrator privileges can append arbitrary SQL commands to existing queries, enabling extraction or manipulation of sensitive database information. This compromises confidentiality, integrity, and availability of the backend database. Furthermore, an unauthenticated attacker can exploit a reflected Cross-Site Scripting (XSS) vulnerability by injecting malicious scripts via the user-agent HTTP header during form submission, which can be leveraged to execute arbitrary scripts in victims’ browsers. The CVSS 3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges (high), no user interaction, and high impact on confidentiality, integrity, and availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used for managing user registrations and payments on WordPress sites, making this a critical risk for websites handling sensitive user data or financial transactions.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with RegistrationMagic for user registration, payment processing, or login management. Exploitation could lead to unauthorized access to sensitive personal data, payment information, and user credentials, violating GDPR and other data protection regulations. The integrity of databases could be compromised, leading to data tampering or deletion, which may disrupt business operations and damage reputation. The reflected XSS vector could facilitate phishing or session hijacking attacks against site administrators or users. Given the high prevalence of WordPress in Europe, including government, education, and commercial sectors, the impact could be widespread. Organizations processing EU citizen data must prioritize remediation to avoid regulatory penalties and operational disruptions.

Mitigation Recommendations

Immediate mitigation steps include restricting administrator access to trusted personnel and monitoring for unusual database queries or web traffic patterns indicative of exploitation attempts. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads and suspicious user-agent strings. Until an official patch is released, implement manual input validation and sanitization on all user-supplied parameters within the plugin’s code, replacing dynamic SQL queries with parameterized prepared statements where possible. Disable or limit the use of the vulnerable plugin if feasible, or replace it with a secure alternative. Conduct thorough security audits and penetration testing on WordPress installations to identify and remediate similar injection points. Maintain up-to-date backups and incident response plans to recover quickly from potential breaches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-30T21:04:18.462Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e5f02d53704711fa0c3714

Added to database: 10/8/2025, 5:01:33 AM

Last enriched: 10/8/2025, 5:01:47 AM

Last updated: 10/9/2025, 4:19:12 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats