CVE-2025-14444
BaseFortify
Publication date: 2026-02-18
Last updated on: 2026-02-18
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| registrationmagic | custom_registration_forms_user_registration_payment_and_user_login | to 6.0.6.9 (inc) |
| registrationmagic | custom_registration_forms_user_registration_payment_and_user_login | 6.0.6.7 |
| registrationmagic | custom_registration_forms_user_registration_payment_and_user_login | 6.0.7.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-345 | The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in the RegistrationMagic WordPress plugin's payment processing function called 'process_paypal_sdk_payment'. The plugin insufficiently verifies the authenticity of payment data by trusting client-supplied values without confirming that the payment was actually completed through PayPal.
This flaw allows unauthenticated attackers to manipulate payment status data and bypass the payment process, enabling them to activate their accounts without making a real PayPal payment.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to bypass paid registration processes, effectively gaining access to paid features or services without payment.
Since attackers can activate accounts without completing real payments, this can lead to revenue loss, unauthorized access to restricted content or services, and potential abuse of the system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This vulnerability involves manipulation of payment status in the 'process_paypal_sdk_payment' function of the RegistrationMagic WordPress plugin, allowing bypass of payment verification. Detection involves monitoring for suspicious or unauthorized payment status updates and verifying that payment callbacks are properly validated."}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your system or network, you can:'}, {'type': 'list_item', 'content': 'Monitor HTTP requests to the AJAX endpoint handling PayPal SDK payments for unusual or repeated requests with manipulated payment statuses.'}, {'type': 'list_item', 'content': "Check your WordPress database table 'PAYPAL_LOGS' for entries where payment status is marked as 'Completed' without corresponding valid PayPal transaction IDs or IPN validation."}, {'type': 'list_item', 'content': 'Look for discrepancies between payment logs and actual PayPal transactions.'}, {'type': 'paragraph', 'content': 'Suggested commands (assuming access to the WordPress server and database):'}, {'type': 'list_item', 'content': "Use MySQL command line or a database client to query suspicious payment logs: \n\n```sql\nSELECT * FROM PAYPAL_LOGS WHERE payment_status = 'Completed' AND (transaction_id IS NULL OR transaction_id = '');\n```"}, {'type': 'list_item', 'content': "Use web server access logs to identify repeated or suspicious AJAX calls to the payment processing endpoint, e.g., using grep:\n\n```bash\ngrep 'process_paypal_sdk_payment' /var/log/apache2/access.log | less\n```"}, {'type': 'list_item', 'content': 'Monitor for unusual POST requests with manipulated payment data using network monitoring tools or intrusion detection systems.'}] [1, 5]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Update the RegistrationMagic plugin to version 6.0.7.0 or later, which includes security fixes addressing this vulnerability by enforcing proper nonce verification and improving payment validation.
- If immediate update is not possible, disable or restrict access to the payment processing AJAX endpoints to trusted users or IP addresses.
- Review and strengthen PayPal payment settings in the plugin, ensuring that both PayPal Client ID and Secret Key are properly configured to enable modern PayPal payment methods securely.
- Monitor payment logs for suspicious activity and manually verify payments before activating user accounts.
- Implement additional server-side validation to verify payment authenticity with PayPal before granting access or activating accounts.