First published: Sat Feb 01 2025(Updated: )
The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, modify forms or modify plugin settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
MagicForm | <=1.6.2 | |
WordPress | <=1.6.2 | |
Dcooperman Magicform Wordpress | <=1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0939 has a high severity rating as it allows authenticated attackers to access and modify data.
To fix CVE-2025-0939, you should update the MagicForm plugin to version 1.6.3 or later, which includes the necessary capability checks.
CVE-2025-0939 affects all versions of the MagicForm plugin up to and including 1.6.2, impacting WordPress users with Subscriber-level access and above.
CVE-2025-0939 involves multiple AJAX actions within the MagicForm plugin that lack proper capability checks.
Yes, it is crucial to patch CVE-2025-0939 immediately to prevent unauthorized data access and modification by authenticated attackers.