CVE-2024-10508

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to reset passwords of any WordPress user, including administrators, by exploiting improper token validation in the RegistrationMagic plugin. All WordPress sites using RegistrationMagic versions up to 6.0.2.6 are affected, potentially leading to complete site compromise.

💻 Affected Systems

Products:
  • RegistrationMagic – User Registration Plugin with Custom Registration Forms
Versions: All versions up to and including 6.0.2.6
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Any WordPress site with the RegistrationMagic plugin installed and active is vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Administrative account compromise leading to unauthorized content changes, plugin/themes installation, or data exfiltration.

🟢

If Mitigated

Limited impact if strong access controls, monitoring, and backup systems are in place to detect and recover from unauthorized changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires minimal technical skill to exploit as it involves manipulating password reset functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.2.7 or later

Vendor Advisory: https://wordpress.org/plugins/custom-registration-form-builder-with-submission-manager/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find RegistrationMagic plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.0.2.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable RegistrationMagic Plugin

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate custom-registration-form-builder-with-submission-manager

🧯 If You Can't Patch

  • Disable the RegistrationMagic plugin immediately.
  • Implement web application firewall rules to block password reset requests targeting the plugin endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → RegistrationMagic version. If version is 6.0.2.6 or lower, you are vulnerable.

Check Version:

wp plugin get custom-registration-form-builder-with-submission-manager --field=version

Verify Fix Applied:

Confirm RegistrationMagic plugin version is 6.0.2.7 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests, especially for administrative accounts from unfamiliar IPs.
  • Multiple failed login attempts followed by successful login from new IP/location.

Network Indicators:

  • HTTP POST requests to /wp-content/plugins/custom-registration-form-builder-with-submission-manager/public/controllers/class_rm_login_controller.php with password reset parameters.

SIEM Query:

source="wordpress.log" AND (uri_path="*class_rm_login_controller*" AND method="POST")

🔗 References

📤 Share & Export