Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15403: CWE-269 Improper Privilege Management in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login

0
Critical
VulnerabilityCVE-2025-15403cvecve-2025-15403cwe-269
Published: Sat Jan 17 2026 (01/17/2026, 02:22:32 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login

Description

CVE-2025-15403 is a critical privilege escalation vulnerability in the WordPress plugin RegistrationMagic (all versions up to 6. 0. 7. 1). It arises from improper privilege management in the 'add_menu' function, accessible via the 'rm_user_exists' AJAX action, allowing unauthenticated attackers to manipulate the admin menu generation logic. Exploitation enables attackers to escalate privileges by injecting an empty slug into the order parameter, granting 'manage_options' capability to a target role. While initial exploitation requires no authentication, further privilege escalation demands at least subscriber-level access. The vulnerability has a CVSS score of 9. 8, indicating critical severity with high impact on confidentiality, integrity, and availability. No known public exploits exist yet.

AI-Powered Analysis

AILast updated: 01/17/2026, 02:50:57 UTC

Technical Analysis

CVE-2025-15403 is a critical vulnerability affecting the RegistrationMagic WordPress plugin, which manages custom registration forms, user registration, payment, and login functionalities. The root cause is improper privilege management (CWE-269) in the 'add_menu' function, which is exposed through the 'rm_user_exists' AJAX action. This function allows unauthenticated attackers to manipulate the 'admin_order' setting by injecting an empty slug into the order parameter. This manipulation alters the plugin's menu generation logic, causing the plugin to assign the 'manage_options' capability—normally reserved for administrators—to a target user role. Initially, attackers can exploit this vulnerability without authentication to influence menu settings, but to fully escalate privileges and gain administrative rights, they must have at least subscriber-level access. The vulnerability impacts all versions up to and including 6.0.7.1 of RegistrationMagic. The CVSS 3.1 score of 9.8 reflects the vulnerability's ease of exploitation (network vector, no authentication required for initial step), and its severe impact on confidentiality, integrity, and availability of affected WordPress sites. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers aiming to gain administrative control over WordPress sites using this plugin. The lack of available patches at the time of disclosure increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress-based websites utilizing the RegistrationMagic plugin. Successful exploitation can lead to unauthorized administrative access, allowing attackers to modify site content, steal sensitive user data, inject malicious code, or disrupt services. This can result in data breaches violating GDPR regulations, reputational damage, financial losses, and potential legal consequences. Organizations with subscriber-level users are particularly vulnerable to full privilege escalation. Given the widespread use of WordPress across Europe for business, government, and e-commerce sites, the impact could be extensive. Attackers exploiting this vulnerability could compromise multiple sites, leading to widespread service disruption and data exposure. The critical severity and network-based exploitation vector make this a high-priority threat for European entities relying on this plugin.

Mitigation Recommendations

Immediate mitigation involves updating the RegistrationMagic plugin to a patched version once available. Until a patch is released, organizations should implement the following specific measures: 1) Restrict access to the 'rm_user_exists' AJAX action by applying web application firewall (WAF) rules to block or rate-limit suspicious requests targeting this endpoint. 2) Harden WordPress user roles by minimizing subscriber-level accounts and reviewing role capabilities to limit privilege escalation opportunities. 3) Disable or remove the RegistrationMagic plugin if it is not essential to reduce attack surface. 4) Monitor WordPress logs and AJAX request patterns for unusual activity related to 'rm_user_exists' or 'add_menu' functions. 5) Employ intrusion detection systems to alert on privilege escalation attempts. 6) Enforce multi-factor authentication (MFA) for all administrative accounts to mitigate impact if privilege escalation occurs. 7) Regularly back up WordPress sites to enable rapid recovery in case of compromise. These targeted actions go beyond generic advice and address the specific attack vectors and exploitation methods of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-31T17:02:01.026Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696af5b4b22c7ad8685027bd

Added to database: 1/17/2026, 2:36:36 AM

Last enriched: 1/17/2026, 2:50:57 AM

Last updated: 1/17/2026, 4:01:51 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats