Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24374: Cross-Site Request Forgery (CSRF) in Metagauss RegistrationMagic

0
Medium
VulnerabilityCVE-2026-24374cvecve-2026-24374
Published: Thu Jan 22 2026 (01/22/2026, 16:52:45 UTC)
Source: CVE Database V5
Vendor/Project: Metagauss
Product: RegistrationMagic

Description

Cross-Site Request Forgery (CSRF) vulnerability in Metagauss RegistrationMagic custom-registration-form-builder-with-submission-manager allows Cross Site Request Forgery.This issue affects RegistrationMagic: from n/a through <= 6.0.6.9.

AI-Powered Analysis

AILast updated: 01/22/2026, 17:24:25 UTC

Technical Analysis

CVE-2026-24374 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Metagauss RegistrationMagic plugin, a WordPress plugin used for building custom registration forms and managing submissions. The vulnerability exists in versions up to 6.0.6.9 and allows an attacker to craft malicious web requests that, when executed by an authenticated user, cause unintended actions within the RegistrationMagic plugin. CSRF attacks exploit the trust a web application has in the user's browser by sending unauthorized commands without the user's consent. In this case, the attacker could potentially manipulate form submissions or alter registration data by leveraging the victim's authenticated session. The vulnerability does not require user interaction beyond the victim visiting a malicious site or clicking a crafted link, but it does require the victim to be logged into the vulnerable WordPress site. No public exploits have been reported yet, and no official patches or CVSS scores are available at the time of publication. The absence of anti-CSRF protections such as tokens or origin checks in the affected versions facilitates this attack vector. This vulnerability primarily threatens the integrity of data managed by RegistrationMagic and could also impact availability if malicious submissions overwhelm the system or disrupt normal workflows.

Potential Impact

For European organizations, the impact of CVE-2026-24374 can be significant, especially for those relying on RegistrationMagic for user registrations, event sign-ups, or other form-based interactions. Successful exploitation could lead to unauthorized changes in registration data, fraudulent submissions, or the creation of invalid user accounts, undermining data integrity and trust in the affected systems. This could result in operational disruptions, increased administrative overhead to identify and correct unauthorized changes, and potential reputational damage if user data is manipulated or misused. Organizations in sectors such as education, event management, and e-commerce that use RegistrationMagic extensively may face higher risks. Additionally, if attackers use this vulnerability as a foothold, it could lead to further compromise of the WordPress environment, affecting confidentiality and availability. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability becomes widely known.

Mitigation Recommendations

To mitigate CVE-2026-24374, organizations should implement several specific measures beyond generic advice: 1) Immediately audit all instances of RegistrationMagic to identify affected versions and prioritize updates. 2) Apply any available patches or updates from Metagauss as soon as they are released. 3) If patches are not yet available, implement manual anti-CSRF protections by adding nonce tokens or verifying the HTTP Referer and Origin headers on form submissions within the plugin code. 4) Restrict administrative and form submission privileges to trusted users and minimize the number of users with elevated permissions. 5) Monitor web server and application logs for unusual form submission patterns or unexpected POST requests. 6) Educate users about the risks of clicking unknown links while authenticated on critical systems. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting RegistrationMagic endpoints. 8) Regularly back up registration data to enable recovery from unauthorized changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-22T14:42:40.516Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259344623b1157c7fb590

Added to database: 1/22/2026, 5:07:00 PM

Last enriched: 1/22/2026, 5:24:25 PM

Last updated: 2/7/2026, 4:56:37 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats