CVE-2024-9390

4.8 MEDIUM

📋 TL;DR

This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious scripts into the RegistrationMagic plugin settings, which then execute when other users view those settings. It affects WordPress multisite installations where unfiltered_html capability is restricted, and all sites using RegistrationMagic plugin versions before 6.0.2.1.

💻 Affected Systems

Products:
  • RegistrationMagic WordPress Plugin
Versions: All versions before 6.0.2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Particularly impactful in WordPress multisite configurations where unfiltered_html capability is disallowed by default for security.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with admin privileges could inject persistent XSS payloads that steal session cookies, redirect users to malicious sites, or perform actions on behalf of victims when they view plugin settings pages.

🟠

Likely Case

Malicious administrator or compromised admin account injects tracking scripts or credential harvesters that affect other privileged users who manage the plugin settings.

🟢

If Mitigated

With proper user access controls and regular security updates, impact is limited to potential data leakage from users who view malicious plugin settings.

🌐 Internet-Facing: MEDIUM - WordPress sites are typically internet-facing, but exploitation requires admin-level authentication.
🏢 Internal Only: LOW - Internal-only WordPress instances still require admin credentials for exploitation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin-level access but is straightforward once authenticated. Public proof-of-concept exists via WPScan.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.2.1

Vendor Advisory: https://wpscan.com/vulnerability/6a5308fb-83bf-4f6a-a7ef-e3e1b69aa80f/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find RegistrationMagic and click 'Update Now'. 4. Alternatively, download version 6.0.2.1+ from WordPress repository and manually replace plugin files.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable RegistrationMagic plugin until patched to prevent exploitation.

wp plugin deactivate registrationmagic

Restrict Admin Access

all

Temporarily limit administrator accounts to only trusted personnel and implement multi-factor authentication.

🧯 If You Can't Patch

  • Remove RegistrationMagic plugin completely if not essential
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check RegistrationMagic plugin version in WordPress admin → Plugins → Installed Plugins. If version is below 6.0.2.1, you are vulnerable.

Check Version:

wp plugin get registrationmagic --field=version

Verify Fix Applied:

Confirm RegistrationMagic plugin version is 6.0.2.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual plugin setting modifications by admin users
  • Multiple requests to RegistrationMagic settings pages with encoded payloads

Network Indicators:

  • Outbound connections to suspicious domains from WordPress admin sessions after viewing plugin settings

SIEM Query:

source="wordpress.log" AND "registrationmagic" AND ("update_option" OR "settings saved") AND ("script" OR "javascript" OR "onload")

🔗 References

📤 Share & Export