First published: Tue May 16 2023(Updated: )
The RegistrationMagic plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.2.1.0. This is due to insufficient verification on the user being supplied during a Google social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Metagauss Registrationmagic | <=5.2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2499 is a vulnerability in the RegistrationMagic plugin for WordPress that allows authentication bypass in versions up to, and including, 5.2.1.0.
CVE-2023-2499 has a severity rating of 9.8 (Critical).
The affected software for CVE-2023-2499 is the RegistrationMagic plugin for WordPress versions up to, and including, 5.2.1.0.
CVE-2023-2499 allows unauthenticated attackers to bypass authentication during a Google social login through the RegistrationMagic plugin.
Yes, you can find more information about CVE-2023-2499 at the following references: [Reference 1](https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/5.2.0.4/services/class_rm_user_services.php#L791), [Reference 2](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2912481%40custom-registration-form-builder-with-submission-manager&new=2912481%40custom-registration-form-builder-with-submission-manager&sfp_email=&sfph_mail=), [Reference 3](https://www.wordfence.com/threat-intel/vulnerabilities/id/87ec5542-b6e7-4b18-a3ec-c258e749d32e?source=cve)