CVE-2025-15403: CWE-269 Improper Privilege Management in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
The RegistrationMagic plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.0.7.1. This is due to the 'add_menu' function is accessible via the 'rm_user_exists' AJAX action and allows arbitrary updates to the 'admin_order' setting. This makes it possible for unauthenticated attackers to injecting an empty slug into the order parameter, and manipulate the plugin's menu generation logic, and when the admin menu is subsequently built, the plugin adds 'manage_options' capability for the target role. Note: The vulnerability can only be exploited unauthenticated, but further privilege escalation requires at least a subscriber user.
AI Analysis
Technical Summary
The RegistrationMagic plugin for WordPress suffers from a privilege escalation vulnerability (CWE-269) due to improper privilege management in the 'add_menu' function. This function is exposed via the 'rm_user_exists' AJAX action, which allows unauthenticated attackers to update the 'admin_order' setting arbitrarily. By injecting an empty slug into the order parameter, attackers can manipulate the plugin's menu generation logic. Consequently, when the admin menu is constructed, the plugin assigns the 'manage_options' capability to the targeted role, enabling privilege escalation. Exploitation requires an unauthenticated attacker to perform the initial manipulation and then leverage a subscriber-level user to escalate privileges further. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity. There is no vendor advisory or patch information currently available to confirm remediation status.
Potential Impact
Successful exploitation allows unauthenticated attackers to manipulate the plugin's menu generation logic and escalate privileges to gain 'manage_options' capability, which typically grants administrative-level access within WordPress. This can lead to full site compromise, including confidentiality, integrity, and availability impacts as reflected by the CVSS score of 9.8. The vulnerability requires a two-step process: initial unauthenticated manipulation followed by privilege escalation from at least a subscriber user account.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict access to the affected plugin or disable it if possible. Monitor for updates from the vendor metagauss regarding patches or official mitigations. Avoid granting subscriber or low-privilege accounts unnecessary permissions that could facilitate exploitation.
CVE-2025-15403: CWE-269 Improper Privilege Management in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Description
The RegistrationMagic plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.0.7.1. This is due to the 'add_menu' function is accessible via the 'rm_user_exists' AJAX action and allows arbitrary updates to the 'admin_order' setting. This makes it possible for unauthenticated attackers to injecting an empty slug into the order parameter, and manipulate the plugin's menu generation logic, and when the admin menu is subsequently built, the plugin adds 'manage_options' capability for the target role. Note: The vulnerability can only be exploited unauthenticated, but further privilege escalation requires at least a subscriber user.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The RegistrationMagic plugin for WordPress suffers from a privilege escalation vulnerability (CWE-269) due to improper privilege management in the 'add_menu' function. This function is exposed via the 'rm_user_exists' AJAX action, which allows unauthenticated attackers to update the 'admin_order' setting arbitrarily. By injecting an empty slug into the order parameter, attackers can manipulate the plugin's menu generation logic. Consequently, when the admin menu is constructed, the plugin assigns the 'manage_options' capability to the targeted role, enabling privilege escalation. Exploitation requires an unauthenticated attacker to perform the initial manipulation and then leverage a subscriber-level user to escalate privileges further. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity. There is no vendor advisory or patch information currently available to confirm remediation status.
Potential Impact
Successful exploitation allows unauthenticated attackers to manipulate the plugin's menu generation logic and escalate privileges to gain 'manage_options' capability, which typically grants administrative-level access within WordPress. This can lead to full site compromise, including confidentiality, integrity, and availability impacts as reflected by the CVSS score of 9.8. The vulnerability requires a two-step process: initial unauthenticated manipulation followed by privilege escalation from at least a subscriber user account.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict access to the affected plugin or disable it if possible. Monitor for updates from the vendor metagauss regarding patches or official mitigations. Avoid granting subscriber or low-privilege accounts unnecessary permissions that could facilitate exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-31T17:02:01.026Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696af5b4b22c7ad8685027bd
Added to database: 1/17/2026, 2:36:36 AM
Last enriched: 4/9/2026, 4:57:09 PM
Last updated: 5/10/2026, 9:13:19 AM
Views: 166
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.