Vulnerability Description
The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 3.7.9.3 (exclusive) via deserialization of untrusted input from the is_expired_by_date() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to fetch a remote file and install it on the site.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Metagauss | Registrationmagic | < 3.7.9.3 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/1733274/custom-registration-form-buPatch
- https://www.wordfence.com/blog/2017/10/3-zero-day-plugin-vulnerabilities-exploitPress/Media CoverageThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c2b79193-f8fc-4ea2-897Technical Description
FAQ
What is CVE-2017-20208?
CVE-2017-20208 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 3.7.9.3 (exclusive) via d...
How severe is CVE-2017-20208?
CVE-2017-20208 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-20208?
Check the references section above for vendor advisories and patch information. Affected products include: Metagauss Registrationmagic.