Plattform
wordpress
Komponente
custom-registration-form-builder-with-submission-manager
Behoben in
6.0.8
CVE-2025-15403 represents a critical privilege escalation vulnerability within the RegistrationMagic plugin for WordPress. This flaw allows unauthenticated attackers to manipulate the plugin's menu generation logic, granting them elevated privileges, specifically the manage_options capability. This vulnerability affects all versions of the plugin up to and including 6.0.7.1 and has been resolved in version 6.0.7.2.
The vulnerability lies in the addmenu function, which is accessible via the rmuserexists AJAX action. An attacker can inject an empty slug into the order parameter, manipulating the plugin's menu generation logic. When the admin menu is subsequently built, the plugin adds the manageoptions capability for the target role, effectively granting the attacker administrator-level access to the WordPress site. This allows the attacker to modify site content, install malicious plugins, and compromise the entire WordPress installation.
CVE-2025-15403 is currently not listed on KEV or EPSS. The CVSS score of 9.8 indicates a critical severity. Public proof-of-concept (POC) exploits are not yet publicly available. The vulnerability was published on 2026-01-17.
Exploit-Status
EPSS
0.14% (34% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-15403 is to immediately upgrade the RegistrationMagic plugin to version 6.0.7.2 or later. As an interim measure, restrict access to the rmuserexists AJAX action. Review the plugin's code for other potential vulnerabilities. Regularly scan your WordPress installation for security vulnerabilities using a reputable security plugin. After upgrading, confirm the fix by attempting to exploit the vulnerability as an unauthenticated user and verifying that the privilege escalation is prevented.
Aktualisieren Sie auf Version 6.0.7.2 oder eine neuere gepatchte Version
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
A CVSS score of 9.8 indicates a critical vulnerability with a high potential for exploitation and a significant impact.
Yes, updating to version 6.0.7.2 or higher is the recommended solution to mitigate this vulnerability. Additionally, reviewing user permissions is advised.
If you are using a version of the RegistrationMagic plugin older than 6.0.7.2, you are vulnerable. You can also monitor server logs for suspicious activity.
Immediately change all passwords, review website files for unauthorized modifications, and consider restoring from a clean backup.
Implement a robust security policy, including regular updates of all plugins and themes, and the use of strong passwords.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.