CVE-2026-0929: CWE-862 Missing Authorization in RegistrationMagic
The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-0929 affects the RegistrationMagic WordPress plugin versions before 6.0.7.2. It stems from a missing authorization check (CWE-862) that allows users with subscriber or higher roles to create forms on the website. Normally, form creation should be restricted to users with elevated privileges such as administrators or editors. However, due to improper capability enforcement, lower-privileged users can exploit this flaw to add unauthorized forms, potentially enabling further attacks such as phishing, data manipulation, or injection of malicious content. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and limited impact on integrity only. The vulnerability does not affect confidentiality or availability directly. No public exploits have been reported yet, but the flaw could be leveraged in targeted attacks against WordPress sites using this plugin. The issue highlights the importance of strict capability checks in WordPress plugins to prevent privilege escalation and unauthorized actions.
Potential Impact
Organizations running WordPress sites with the vulnerable RegistrationMagic plugin risk unauthorized form creation by users with subscriber-level access or higher. This can lead to integrity issues such as unauthorized content injection, phishing form deployment, or manipulation of site workflows. While confidentiality and availability are not directly impacted, the unauthorized forms could be used as vectors for social engineering or to collect sensitive user data illicitly. The attack requires an authenticated user account, so the threat is more relevant in environments where subscriber accounts are granted to untrusted or external users. The scope of impact depends on the number of sites using this plugin and the level of access granted to subscribers. Exploitation could undermine trust in the affected websites and potentially lead to reputational damage or compliance issues if user data is mishandled.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade the RegistrationMagic plugin to version 6.0.7.2 or later where the authorization checks are properly implemented. Until patching is possible, administrators should restrict subscriber-level account creation and review user roles to minimize exposure. Implementing strict user role management and monitoring form creation activities can help detect unauthorized changes. Additionally, applying the principle of least privilege by limiting subscriber capabilities or disabling unnecessary plugin features reduces risk. Web application firewalls (WAFs) can be configured to alert on unusual form creation requests. Regular security audits of WordPress plugins and user permissions are recommended to identify and remediate similar authorization issues proactively.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, France, Brazil, Japan, Netherlands
CVE-2026-0929: CWE-862 Missing Authorization in RegistrationMagic
Description
The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-0929 affects the RegistrationMagic WordPress plugin versions before 6.0.7.2. It stems from a missing authorization check (CWE-862) that allows users with subscriber or higher roles to create forms on the website. Normally, form creation should be restricted to users with elevated privileges such as administrators or editors. However, due to improper capability enforcement, lower-privileged users can exploit this flaw to add unauthorized forms, potentially enabling further attacks such as phishing, data manipulation, or injection of malicious content. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and limited impact on integrity only. The vulnerability does not affect confidentiality or availability directly. No public exploits have been reported yet, but the flaw could be leveraged in targeted attacks against WordPress sites using this plugin. The issue highlights the importance of strict capability checks in WordPress plugins to prevent privilege escalation and unauthorized actions.
Potential Impact
Organizations running WordPress sites with the vulnerable RegistrationMagic plugin risk unauthorized form creation by users with subscriber-level access or higher. This can lead to integrity issues such as unauthorized content injection, phishing form deployment, or manipulation of site workflows. While confidentiality and availability are not directly impacted, the unauthorized forms could be used as vectors for social engineering or to collect sensitive user data illicitly. The attack requires an authenticated user account, so the threat is more relevant in environments where subscriber accounts are granted to untrusted or external users. The scope of impact depends on the number of sites using this plugin and the level of access granted to subscribers. Exploitation could undermine trust in the affected websites and potentially lead to reputational damage or compliance issues if user data is mishandled.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade the RegistrationMagic plugin to version 6.0.7.2 or later where the authorization checks are properly implemented. Until patching is possible, administrators should restrict subscriber-level account creation and review user roles to minimize exposure. Implementing strict user role management and monitoring form creation activities can help detect unauthorized changes. Additionally, applying the principle of least privilege by limiting subscriber capabilities or disabling unnecessary plugin features reduces risk. Web application firewalls (WAFs) can be configured to alert on unusual form creation requests. Regular security audits of WordPress plugins and user permissions are recommended to identify and remediate similar authorization issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2026-01-13T21:48:59.398Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69930886d1735ca7315e7f7f
Added to database: 2/16/2026, 12:07:34 PM
Last enriched: 2/24/2026, 12:01:26 AM
Last updated: 4/1/2026, 4:02:54 PM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.