Description
The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'RM_Forms' shortcode in all versions up to, and including, 6.0.6.7 due to insufficient input sanitization and output escaping on the 'theme' attribute. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-12-15
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that can lead to session hijacking and data theft
Action: Apply Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the RegistrationMagic WordPress plugin, triggered through the RM_Forms shortcode when an attacker supplies a malicious value for the theme attribute. The vulnerability allows an authenticated contributor or higher to inject arbitrary JavaScript that will execute for any user who viewing the affected form page, potentially enabling a range of client‑side attacks such as credential theft, session hijacking, or defacement.

Affected Systems

Any WordPress site installing RegistrationMagic 6.0.6.7 or earlier, including all distributions of the Plugin belonging to the metagauss vendor.

Risk and Exploitability

The CVSS base score is 6.4, which denotes a moderate severity; the EPSS score of less than 1% suggests a very low probability of widespread exploitation at this time. The vulnerability is not listed in CISA KEV. The exploit requires authenticated access to the WordPress site with contributor or higher privileges, and the attacker must create or edit a form that contains the malicious theme attribute; once injected, the script runs automatically for any visitor accessing that form.

Generated by OpenCVE AI on April 21, 2026 at 17:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update RegistrationMagic to the latest stable release (6.0.6.8 or later) which removes the unsanitized theme attribute handling.
  • If an immediate update is not possible, temporarily restrict contributor and editor roles from using or editing forms, or remove the RM_Forms shortcode from public pages.
  • Consider configuring a site‑wide content‑security‑policy that disallows inline scripts to mitigate the impact of any remaining XSS payloads.

Generated by OpenCVE AI on April 21, 2026 at 17:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Metagauss
Metagauss registrationmagic
Wordpress
Wordpress wordpress
Vendors & Products Metagauss
Metagauss registrationmagic
Wordpress
Wordpress wordpress

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 14:45:00 +0000

Type Values Removed Values Added
Description The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'RM_Forms' shortcode in all versions up to, and including, 6.0.6.7 due to insufficient input sanitization and output escaping on the 'theme' attribute. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title RegistrationMagic <= 6.0.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'RM_Forms' Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Metagauss Registrationmagic
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:05.883Z

Reserved: 2025-11-24T15:47:46.024Z

Link: CVE-2025-13610

cve-icon Vulnrichment

Updated: 2025-12-15T15:42:30.731Z

cve-icon NVD

Status : Deferred

Published: 2025-12-15T15:15:48.500

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:15:25Z

Weaknesses