Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools
  • Home
  • Vulnerabilities
  • CVE Alert: CVE-2025-11204 – metagauss – RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
  • Vulnerabilities

CVE Alert: CVE-2025-11204 – metagauss – RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login

October 8, 2025

CVE-2025-11204

HIGHNo exploitation known

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 6.0.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. An unauthenticated attacker could utilize an injected Cross-Site Scripting via user-agent on form submission to leverage this to achieve Reflected Cross-Site Scripting.

CVSS v3.1 (7.2)
Vendor
metagauss
Product
RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
Versions
* lte 6.0.6.2
CWE
CWE-89, CWE-89 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Published
2025-10-08T04:23:40.019Z
Updated
2025-10-08T04:23:40.019Z
References
https://www.wordfence.com/threat-intel/vulnerabilities/id/4532cb38-453b-460c-879d-6f0e1caacafc?source=cve
https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_reports_service.php?rev=3360241
https://wordpress.org/plugins/custom-registration-form-builder-with-submission-manager/
https://plugins.trac.wordpress.org/changeset/3374106/custom-registration-form-builder-with-submission-manager/trunk?contextall=1&old=3366909&old_path=%2Fcustom-registration-form-builder-with-submission-manager%2Ftrunk

AI Summary Analysis

Risk verdict

High risk to sites using the affected plugin; exploitation is plausible for attackers with admin access and the accompanying XSS path raises additional exposure, so patching should be treated as urgent.

Why this matters

Authenticated SQL injection can exfiltrate sensitive database data, including user records. The described unauthenticated XSS path, if feasible in some configurations, could enable client-side script execution or session theft, aggravating the impact on visitor and admin accounts. Together, these vectors threaten data integrity, confidentiality and availability of WordPress sites relying on the plugin.

Most likely attack path

Precondition: plugin present and reachable; attacker already has administrator or higher privileges (per CVSS). An injection targets the plugin’s queries, allowing appending of SQL statements to read or alter data. A secondary XSS path could be triggered via form submissions or user-agent manipulation, depending on environment, potentially broadening impact.

Who is most exposed

Sites with the vulnerable plugin installed and with active admin access are at greatest risk, especially multi-user or e-commerce WordPress deployments on shared hosting or exposed admin interfaces.

Detection ideas

  • Spike in database errors or long-running SQL queries in server logs.
  • Unusual admin actions or privilege escalations.
  • Anomalous data exports or unexpected data access from user tables.
  • Suspicious user-agent payloads appearing in form submissions.
  • WAF/IDS alerts for SQL injection patterns in registration/login forms.

Mitigation and prioritisation

  • Patch to the latest fixed version immediately; test in staging before production rollout.
  • If patching is not possible, disable the plugin or restrict admin access; apply compensating controls.
  • Enforce MFA and rotate admin credentials; implement least-privilege for accounts.
  • Implement WAF rules and network controls to block SQLi-like payloads in inputs.
  • Schedule change management with a defined maintenance window; verify database integrity post-patch.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

Buy Me A Coffee
Patreon

To keep up to date follow us on the below channels.

Telegram Discord Reddit LinkedIn Mastodon
Tags: CVE, cve-2025-11204, metagauss, OSINT, registrationmagic-custom-registration-forms-user-registration-payment-and-user-login, threatintel

Post navigation

Previous: CovenantC2 Detected – 102[.]212[.]247[.]231:7443
Next: CVE Alert: CVE-2025-11424 – code-projects – Web-Based Inventory and POS System

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: blu-ray-disc-java-sandbox-escape-via-two-vulnerabilities-theflow

October 18, 2025
hackerone
  • Bug Bounty

HackerOne Bug Bounty Disclosure: application-level-dos-large-markdown-payload-in-reply-section-leading-to-resource-exhaustion-theteatoast

October 18, 2025
image
  • Data Breach
  • Ransomware

[HANDALA] – Ransomware Victim: Saturday Reckoning

October 18, 2025
brute_ratel_c4
  • Brute Ratel C4

Brute Ratel C4 Detected – 52[.]68[.]211[.]55:80

October 18, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-5555 – Nixdorf Wincor – PORT IO Driver

October 18, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel