CVE-2025-14444
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-02-18

Last updated on: 2026-02-18

Assigner: Wordfence

Description
The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to payment bypass due to insufficient verification of data authenticity on the 'process_paypal_sdk_payment' function in all versions up to, and including, 6.0.6.9. This is due to the plugin trusting client-supplied values for payment verification without validating that the payment actually went through PayPal. This makes it possible for unauthenticated attackers to bypass paid registration by manipulating payment status and activating their account without completing a real PayPal payment.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
registrationmagic custom_registration_forms_user_registration_payment_and_user_login to 6.0.6.9 (inc)
registrationmagic custom_registration_forms_user_registration_payment_and_user_login 6.0.6.7
registrationmagic custom_registration_forms_user_registration_payment_and_user_login 6.0.7.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-345 The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the RegistrationMagic WordPress plugin's payment processing function called 'process_paypal_sdk_payment'. The plugin insufficiently verifies the authenticity of payment data by trusting client-supplied values without confirming that the payment was actually completed through PayPal.

This flaw allows unauthenticated attackers to manipulate payment status data and bypass the payment process, enabling them to activate their accounts without making a real PayPal payment.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to bypass paid registration processes, effectively gaining access to paid features or services without payment.

Since attackers can activate accounts without completing real payments, this can lead to revenue loss, unauthorized access to restricted content or services, and potential abuse of the system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves manipulation of payment status in the 'process_paypal_sdk_payment' function of the RegistrationMagic WordPress plugin, allowing bypass of payment verification. Detection involves monitoring for suspicious or unauthorized payment status updates and verifying that payment callbacks are properly validated."}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your system or network, you can:'}, {'type': 'list_item', 'content': 'Monitor HTTP requests to the AJAX endpoint handling PayPal SDK payments for unusual or repeated requests with manipulated payment statuses.'}, {'type': 'list_item', 'content': "Check your WordPress database table 'PAYPAL_LOGS' for entries where payment status is marked as 'Completed' without corresponding valid PayPal transaction IDs or IPN validation."}, {'type': 'list_item', 'content': 'Look for discrepancies between payment logs and actual PayPal transactions.'}, {'type': 'paragraph', 'content': 'Suggested commands (assuming access to the WordPress server and database):'}, {'type': 'list_item', 'content': "Use MySQL command line or a database client to query suspicious payment logs: \n\n```sql\nSELECT * FROM PAYPAL_LOGS WHERE payment_status = 'Completed' AND (transaction_id IS NULL OR transaction_id = '');\n```"}, {'type': 'list_item', 'content': "Use web server access logs to identify repeated or suspicious AJAX calls to the payment processing endpoint, e.g., using grep:\n\n```bash\ngrep 'process_paypal_sdk_payment' /var/log/apache2/access.log | less\n```"}, {'type': 'list_item', 'content': 'Monitor for unusual POST requests with manipulated payment data using network monitoring tools or intrusion detection systems.'}] [1, 5]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Update the RegistrationMagic plugin to version 6.0.7.0 or later, which includes security fixes addressing this vulnerability by enforcing proper nonce verification and improving payment validation.
  • If immediate update is not possible, disable or restrict access to the payment processing AJAX endpoints to trusted users or IP addresses.
  • Review and strengthen PayPal payment settings in the plugin, ensuring that both PayPal Client ID and Secret Key are properly configured to enable modern PayPal payment methods securely.
  • Monitor payment logs for suspicious activity and manually verify payments before activating user accounts.
  • Implement additional server-side validation to verify payment authenticity with PayPal before granting access or activating accounts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart