The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 3.7.9.3 (exclusive) via deserialization of untrusted input from the is_expired_by_date() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to fetch a remote file and install it on the site.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Metagauss
Metagauss registrationmagic Registrationmagic Registrationmagic registrationmagic Wordpress Wordpress wordpress |
|
| Vendors & Products |
Metagauss
Metagauss registrationmagic Registrationmagic Registrationmagic registrationmagic Wordpress Wordpress wordpress |
Sat, 18 Oct 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 3.7.9.3 (exclusive) via deserialization of untrusted input from the is_expired_by_date() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to fetch a remote file and install it on the site. | |
| Title | RegistrationMagic - Custom Registration Forms <= 3.7.9.2 - PHP Object Injection | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-18T03:33:25.276Z
Updated: 2025-10-20T16:00:28.088Z
Reserved: 2025-10-17T15:02:26.155Z
Link: CVE-2017-20208
Updated: 2025-10-20T16:00:21.432Z
Status : Awaiting Analysis
Published: 2025-10-18T04:15:59.477
Modified: 2025-10-21T19:31:25.450
Link: CVE-2017-20208
No data.