Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0929: CWE-862 Missing Authorization in RegistrationMagic

0
Medium
VulnerabilityCVE-2026-0929cvecve-2026-0929cwe-862
Published: Mon Feb 16 2026 (02/16/2026, 06:00:01 UTC)
Source: CVE Database V5
Product: RegistrationMagic

Description

The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allowing subscribers and above to create forms on the site.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 00:01:26 UTC

Technical Analysis

The vulnerability identified as CVE-2026-0929 affects the RegistrationMagic WordPress plugin versions before 6.0.7.2. It stems from a missing authorization check (CWE-862) that allows users with subscriber or higher roles to create forms on the website. Normally, form creation should be restricted to users with elevated privileges such as administrators or editors. However, due to improper capability enforcement, lower-privileged users can exploit this flaw to add unauthorized forms, potentially enabling further attacks such as phishing, data manipulation, or injection of malicious content. The CVSS v3.1 base score is 4.3, reflecting a medium severity with network attack vector, low attack complexity, requiring privileges but no user interaction, and limited impact on integrity only. The vulnerability does not affect confidentiality or availability directly. No public exploits have been reported yet, but the flaw could be leveraged in targeted attacks against WordPress sites using this plugin. The issue highlights the importance of strict capability checks in WordPress plugins to prevent privilege escalation and unauthorized actions.

Potential Impact

Organizations running WordPress sites with the vulnerable RegistrationMagic plugin risk unauthorized form creation by users with subscriber-level access or higher. This can lead to integrity issues such as unauthorized content injection, phishing form deployment, or manipulation of site workflows. While confidentiality and availability are not directly impacted, the unauthorized forms could be used as vectors for social engineering or to collect sensitive user data illicitly. The attack requires an authenticated user account, so the threat is more relevant in environments where subscriber accounts are granted to untrusted or external users. The scope of impact depends on the number of sites using this plugin and the level of access granted to subscribers. Exploitation could undermine trust in the affected websites and potentially lead to reputational damage or compliance issues if user data is mishandled.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade the RegistrationMagic plugin to version 6.0.7.2 or later where the authorization checks are properly implemented. Until patching is possible, administrators should restrict subscriber-level account creation and review user roles to minimize exposure. Implementing strict user role management and monitoring form creation activities can help detect unauthorized changes. Additionally, applying the principle of least privilege by limiting subscriber capabilities or disabling unnecessary plugin features reduces risk. Web application firewalls (WAFs) can be configured to alert on unusual form creation requests. Regular security audits of WordPress plugins and user permissions are recommended to identify and remediate similar authorization issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-13T21:48:59.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69930886d1735ca7315e7f7f

Added to database: 2/16/2026, 12:07:34 PM

Last enriched: 2/24/2026, 12:01:26 AM

Last updated: 4/1/2026, 4:02:54 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses