Home

Description

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to payment bypass due to insufficient verification of data authenticity on the 'process_paypal_sdk_payment' function in all versions up to, and including, 6.0.6.9. This is due to the plugin trusting client-supplied values for payment verification without validating that the payment actually went through PayPal. This makes it possible for unauthenticated attackers to bypass paid registration by manipulating payment status and activating their account without completing a real PayPal payment.

PUBLISHED Reserved 2025-12-10 | Published 2026-02-18 | Updated 2026-02-18 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-345 Insufficient Verification of Data Authenticity

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-01-23:Vendor Notified
2026-02-17:Disclosed

Credits

Md. Moniruzzaman Prodhan finder

References

www.wordfence.com/...-6580-4feb-b98a-c465df3e2bed?source=cve

plugins.trac.wordpress.org/...es/class_rm_paypal_service.php

plugins.trac.wordpress.org/...es/class_rm_paypal_service.php

plugins.trac.wordpress.org/...s/class_registration_magic.php

plugins.trac.wordpress.org/changeset/3426151

cve.org (CVE-2025-14444)

nvd.nist.gov (CVE-2025-14444)

Download JSON