Authentication Bypass Flaw CVE-2023-2499 in WordPress Plugin With Over 10,000 Installations
WordPress, one of the world’s most popular content management systems, powers over 40% of all websites worldwide. Within its vast ecosystem, plugins are indispensable tools that extend functionality and improve user experience. However, with over 50,000 plugins available, the potential for security vulnerabilities increases. One such plugin, RegistrationMagic, recently came under the cybersecurity spotlight with the discovery of a severe flaw.
RegistrationMagic, a robust WordPress user registration plugin, offers users full control over their website’s user registrations. With the ability to create diverse registration forms with pre-defined fields, the plugin boasts over 10,000 active installs worldwide. However, a critical vulnerability, identified as CVE-2023-2499, has been discovered, putting the plugin’s reputation and users at risk.
CVE-2023-2499: Authentication Bypass Vulnerability
Carrying a high-risk CVSS score of 9.8, CVE-2023-2499 is an authentication bypass vulnerability present in RegistrationMagic versions up to and including 5.2.1.0. The flaw results from insufficient verification during a Google social login through the plugin. This security loophole potentially allows unauthenticated attackers to log in as any existing user on the site, including administrators, provided they have access to the email.
The implications of this vulnerability are alarming. An attacker gaining access as an administrator can make unauthorized changes, steal sensitive information, or even seize control of the entire site. All it takes is the knowledge of an email address, turning this seemingly harmless information into a master key.
This flaw was discovered by Lana Codes, a researcher at Wordfence, a security firm renowned for uncovering WordPress vulnerabilities. The quick identification and disclosure of this issue has helped to prevent widespread exploitation.
Remediation Measures
Upon discovering the vulnerability, the maintainers of RegistrationMagic promptly released a patch. Users of the plugin are strongly urged to update to version 5.2.1.1 or any subsequent patched version. This upgrade will effectively eliminate the authentication bypass issue, restoring the plugin’s security and trustworthiness.
The discovery of CVE-2023-2499 serves as a stark reminder of the importance of diligent plugin management. As part of best practices, users should regularly update their plugins, themes, and the WordPress core. Additionally, the use of security plugins, like Wordfence, can offer an added layer of protection by identifying and blocking potential threats.