CVE-2021-4073
📋 TL;DR
CVE-2021-4073 is an authentication bypass vulnerability in the RegistrationMagic WordPress plugin that allows unauthenticated attackers to log in as any user (including administrators) by knowing a valid username. This affects WordPress sites using RegistrationMagic plugin versions 5.0.1.7 and earlier. The vulnerability stems from missing identity validation in the social login function.
💻 Affected Systems
- RegistrationMagic (Custom Registration Form Builder with Submission Manager) WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover: attackers gain administrative access, can install backdoors, steal data, deface websites, or use the site for further attacks.
Likely Case
Unauthorized access to user accounts leading to data theft, privilege escalation, and potential administrative compromise.
If Mitigated
Limited impact with proper network segmentation, but still exposes user data and could lead to lateral movement.
🎯 Exploit Status
Exploitation is straightforward: attackers only need to know a valid username and can bypass authentication via the social login function. Public proof-of-concept exists in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.0.1.8
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2635173/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_user_services.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'RegistrationMagic' and update to version 5.0.1.8 or later. 4. Alternatively, download the latest version from WordPress plugin repository and manually update.
🔧 Temporary Workarounds
Disable RegistrationMagic Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate custom-registration-form-builder-with-submission-manager
Restrict Access to WordPress Admin
allLimit access to WordPress admin interface using IP whitelisting or web application firewall rules.
🧯 If You Can't Patch
- Remove the RegistrationMagic plugin completely if not essential
- Implement strong network segmentation and monitor for unauthorized login attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → Installed Plugins for RegistrationMagic version. If version is 5.0.1.7 or lower, you are vulnerable.
Check Version:
wp plugin get custom-registration-form-builder-with-submission-manager --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 5.0.1.8 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts followed by successful login from same IP
- Successful logins for multiple users from same IP in short timeframe
- Unusual user agent strings in authentication logs
Network Indicators:
- HTTP POST requests to /wp-admin/admin-ajax.php with action=rm_social_login
- Unusual spikes in authentication traffic
SIEM Query:
source="wordpress.log" AND ("rm_social_login" OR "RegistrationMagic") AND status=200
🔗 References
- https://plugins.trac.wordpress.org/changeset/2635173/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_user_services.php
- https://www.wordfence.com/blog/2021/12/authentication-bypass-vulnerability-patched-in-user-registration-plugin/
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4073
- https://plugins.trac.wordpress.org/changeset/2635173/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_user_services.php
- https://www.wordfence.com/blog/2021/12/authentication-bypass-vulnerability-patched-in-user-registration-plugin/
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4073