Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0929: CWE-862 Missing Authorization in RegistrationMagic

0
Medium
VulnerabilityCVE-2026-0929cvecve-2026-0929cwe-862
Published: Mon Feb 16 2026 (02/16/2026, 06:00:01 UTC)
Source: CVE Database V5
Product: RegistrationMagic

Description

CVE-2026-0929 is a missing authorization vulnerability in the RegistrationMagic WordPress plugin versions before 6. 0. 7. 2. It allows users with subscriber-level access or higher to create forms on the affected WordPress site without proper capability checks. This could lead to unauthorized content injection or manipulation within the site. No known exploits are currently reported in the wild. The vulnerability affects the integrity and potentially the availability of the website by enabling unauthorized form creation. Exploitation requires at least subscriber-level access but no further authentication bypass. European organizations using this plugin should prioritize patching or restricting subscriber permissions.

AI-Powered Analysis

AILast updated: 02/16/2026, 12:08:05 UTC

Technical Analysis

CVE-2026-0929 is a vulnerability classified under CWE-862 (Missing Authorization) found in the RegistrationMagic WordPress plugin prior to version 6.0.7.2. The flaw arises because the plugin does not implement proper capability checks when users attempt to create forms. Specifically, users with subscriber-level privileges or higher can create new forms on the WordPress site, a capability that should typically be restricted to administrators or trusted roles. This lack of authorization control can allow unauthorized users to inject forms that may be used for phishing, spam, or other malicious activities, potentially undermining the integrity of the website's content and user trust. Although the vulnerability does not directly lead to remote code execution or data leakage, the ability to create arbitrary forms can be leveraged as a foothold for further attacks or social engineering campaigns. The vulnerability was published on February 16, 2026, with no CVSS score assigned and no known exploits reported in the wild. The issue affects all versions before 6.0.7.2, and no official patch links were provided at the time of reporting. The vulnerability requires the attacker to have at least subscriber-level access, meaning that exploitation is limited to users who have already registered or been granted minimal access to the site. This reduces the attack surface but does not eliminate risk, especially on sites that allow open registration or have weak user management policies.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential for unauthorized content injection and manipulation via form creation. Attackers with subscriber access could create malicious forms to harvest sensitive data, conduct phishing attacks, or distribute malware, thereby compromising the confidentiality and integrity of user data and the website. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations if personal data is mishandled), and disrupt normal business operations. While the vulnerability does not directly allow for system takeover or data exfiltration, it can serve as an initial vector for more complex attacks. Organizations with open or loosely controlled user registration processes are particularly at risk. The absence of known exploits reduces immediate threat but does not preclude future exploitation. The impact on availability is limited but possible if malicious forms are used to overload site resources or cause operational disruptions.

Mitigation Recommendations

European organizations should immediately upgrade the RegistrationMagic plugin to version 6.0.7.2 or later once available to ensure proper authorization checks are enforced. Until patches are applied, administrators should restrict the ability to register new users or assign subscriber roles only to trusted individuals. Implement strict user role management policies to limit subscriber privileges and monitor for unusual form creation activity. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized form creation attempts. Conduct regular audits of user accounts and plugin configurations to identify and remediate potential abuse. Additionally, consider disabling the RegistrationMagic plugin if it is not essential to reduce the attack surface. Educate site administrators on the risks of granting unnecessary permissions and encourage the use of multi-factor authentication to protect user accounts. Finally, monitor security advisories from the plugin vendor and WordPress security communities for updates or emerging exploit information.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-13T21:48:59.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69930886d1735ca7315e7f7f

Added to database: 2/16/2026, 12:07:34 PM

Last enriched: 2/16/2026, 12:08:05 PM

Last updated: 2/16/2026, 1:09:22 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats