RegistrationMagic – Custom Registration Forms, User Registration, P…

RegistrationMagic – Custom Registration Forms, User Registration, P…

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-0929 affects the WordPress plugin RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login (slug: custom-registration-form-builder-with-submission-manager) and is rated Medium severity (CVSS 4.3; CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

The primary attack path involves an attacker first obtaining a valid WordPress account (for example, a standard Subscriber account). Once authenticated, they can trigger an unauthorized action over the network without needing to trick an administrator or require user interaction.

This is especially relevant for sites that allow public user registration, run community or membership features, or have many low-privilege accounts (customers, partners, contractors, or temporary staff).

Security Weakness

RegistrationMagic versions up to 6.0.7.2 are reported to be vulnerable due to a missing authorization (capability) check on a plugin function. In practical terms, this means the plugin may not consistently verify that a logged-in user has the right permissions before allowing certain actions to run.

Because the issue requires only subscriber-level access (and above), it shifts risk away from purely anonymous attacks and toward scenarios involving account creation, compromised low-level accounts, shared credentials, or insiders.

As of the referenced advisory, there is no known patch available. Source: Wordfence vulnerability record. CVE record: CVE-2026-0929.

Technical or Business Impacts

While the advisory describes the impact as an “unauthorized action” (without publicly detailing every outcome), the business risk is that a low-privileged user may be able to perform actions that should be restricted—potentially affecting site integrity (unapproved changes), operational reliability (unexpected configuration or workflow changes), and compliance posture (weak access controls).

For marketing and revenue teams, the practical consequences can include disruption to registration or lead capture flows, reduced trust in form submissions, and potential downstream impacts to campaigns, attribution, and customer experience. For compliance and finance stakeholders, the key concern is governance: access control gaps can become audit findings, especially if the site supports payments or handles customer data as part of registration workflows.

Mitigation guidance (given no known patch): consider uninstalling RegistrationMagic and replacing it with an alternative that is actively maintained and meets your risk requirements. If immediate removal is not feasible, reduce exposure by limiting who can register accounts, reviewing existing low-privilege accounts, enforcing strong authentication for all users, and increasing monitoring for unusual logged-in activity until you can complete a migration.

Similar attacks: Authorization-check issues in WordPress plugins are a recurring pattern. For reference, see real examples such as CVE-2024-27956 (WP Automatic) and CVE-2023-27372 (BuddyPress) in the official CVE database.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers