Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15520: CWE-200 Information Exposure in RegistrationMagic

0
Medium
VulnerabilityCVE-2025-15520cvecve-2025-15520cwe-200
Published: Fri Feb 13 2026 (02/13/2026, 06:00:07 UTC)
Source: CVE Database V5
Product: RegistrationMagic

Description

CVE-2025-15520 is a medium-severity information exposure vulnerability in the RegistrationMagic WordPress plugin versions prior to 6. 0. 7. 2. The flaw arises because the plugin verifies nonces but fails to check user capabilities properly, allowing users with subscriber-level privileges or higher to access sensitive data not intended for them. Exploitation requires at least low-level authenticated access but no user interaction beyond that. The vulnerability impacts confidentiality but does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using RegistrationMagic on WordPress sites should prioritize updating to version 6. 0.

AI-Powered Analysis

AILast updated: 02/20/2026, 09:07:00 UTC

Technical Analysis

CVE-2025-15520 is an information exposure vulnerability classified under CWE-200 found in the RegistrationMagic WordPress plugin before version 6.0.7.2. The vulnerability stems from the plugin's failure to enforce proper capability checks when processing requests, despite verifying nonces to prevent CSRF attacks. This means that authenticated users with subscriber-level privileges or higher can access sensitive data that should be restricted to higher privilege roles. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, and impacts confidentiality only, without affecting integrity or availability. The scope remains unchanged as the vulnerability affects only the plugin's data exposure within the same WordPress installation. No known public exploits have been reported yet, but the flaw could be leveraged to gather sensitive information such as user data or configuration details, which could facilitate further attacks. The vulnerability highlights a common security oversight where nonce validation is implemented without corresponding capability checks, undermining access control mechanisms. The patch for this vulnerability involves adding proper capability checks to ensure that only authorized roles can access sensitive endpoints or data within the plugin.

Potential Impact

The primary impact of CVE-2025-15520 is unauthorized disclosure of sensitive information to users with subscriber-level access or above. This can lead to leakage of personal data, configuration details, or other sensitive content managed by the RegistrationMagic plugin. While the vulnerability does not allow modification or deletion of data, the exposure of confidential information can aid attackers in crafting targeted phishing campaigns, privilege escalation attempts, or other follow-on attacks. Organizations relying on RegistrationMagic for form management on WordPress sites may face reputational damage, compliance violations (e.g., GDPR), and loss of customer trust if sensitive data is exposed. Since the vulnerability requires authenticated access, the risk is somewhat mitigated by the need for user accounts, but many WordPress sites allow user registrations at subscriber level by default, increasing the attack surface. The absence of known exploits reduces immediate risk, but the medium severity score indicates that timely patching is important to prevent potential abuse.

Mitigation Recommendations

To mitigate CVE-2025-15520, organizations should immediately update the RegistrationMagic plugin to version 6.0.7.2 or later, where the vulnerability is patched. In addition, administrators should audit user roles and permissions to restrict subscriber-level accounts from accessing sensitive areas of the site unnecessarily. Implementing the principle of least privilege by limiting user registrations or disabling unnecessary accounts can reduce exposure. Monitoring logs for unusual access patterns or attempts to access restricted data can help detect exploitation attempts. Employing Web Application Firewalls (WAFs) with rules tailored to block suspicious requests targeting the plugin endpoints may provide additional protection. Regular security assessments and plugin updates should be part of the WordPress site maintenance routine to prevent similar vulnerabilities. Finally, educating site administrators about the importance of capability checks in plugin development can help avoid such issues in custom or third-party plugins.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-13T21:58:14.083Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698ec262c9e1ff5ad8f5317e

Added to database: 2/13/2026, 6:19:14 AM

Last enriched: 2/20/2026, 9:07:00 AM

Last updated: 2/21/2026, 12:21:40 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats