{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T20:10:28.556","vulnerabilities":[{"cve":{"id":"CVE-2025-14444","sourceIdentifier":"security@wordfence.com","published":"2026-02-18T11:16:30.453","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to payment bypass due to insufficient verification of data authenticity on the 'process_paypal_sdk_payment' function in all versions up to, and including, 6.0.6.9. This is due to the plugin trusting client-supplied values for payment verification without validating that the payment actually went through PayPal. This makes it possible for unauthenticated attackers to bypass paid registration by manipulating payment status and activating their account without completing a real PayPal payment."},{"lang":"es","value":"El plugin RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login para WordPress es vulnerable a la elusión de pagos debido a una verificación insuficiente de la autenticidad de los datos en la función 'process_paypal_sdk_payment' en todas las versiones hasta la 6.0.6.9, inclusive. Esto se debe a que el plugin confía en los valores proporcionados por el cliente para la verificación de pagos sin validar que el pago realmente se realizó a través de PayPal. Esto hace posible que atacantes no autenticados eludan el registro de pago manipulando el estado del pago y activando su cuenta sin completar un pago real de PayPal."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-345"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/6.0.6.7/includes/class_registration_magic.php#L232","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/6.0.6.7/services/class_rm_paypal_service.php#L324","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_paypal_service.php#L324","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3426151","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/0633bf06-6580-4feb-b98a-c465df3e2bed?source=cve","source":"security@wordfence.com"}]}}]}