CVE-2025-24686
Published: 31 January 2025
Summary
CVE-2025-24686 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Metagauss Registrationmagic. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 42.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates reflected XSS by requiring output filtering and encoding prior to web page generation to neutralize malicious scripts.
Prevents injection of malicious payloads by validating and sanitizing user inputs at web application entry points.
Addresses the specific flaw in the RegistrationMagic plugin by requiring timely remediation through patching vulnerable versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Reflected XSS enables arbitrary JS execution in browser context for session cookie theft and hijacking (T1185); exploitation requires user interaction with malicious crafted URL (T1204.001).
NVD Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss RegistrationMagic custom-registration-form-builder-with-submission-manager allows Reflected XSS.This issue affects RegistrationMagic: from n/a through <= 6.0.3.3.
Deeper analysisAI
CVE-2025-24686 is an Improper Neutralization of Input During Web Page Generation vulnerability, classified as Reflected Cross-site Scripting (XSS) under CWE-79, in the Metagauss RegistrationMagic plugin (custom-registration-form-builder-with-submission-manager) for WordPress. This issue affects versions from n/a through 6.0.3.3. Published on 2025-01-31, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
A remote attacker with no required privileges can exploit this vulnerability over the network with low complexity, provided a user interacts by visiting a maliciously crafted URL on an affected site. Successful exploitation changes scope and enables low-impact effects on confidentiality, integrity, and availability, such as executing arbitrary JavaScript in the victim's browser to steal session cookies or perform other client-side actions within the site's context.
Mitigation details are available in advisories like the Patchstack database entry at https://patchstack.com/database/Wordpress/Plugin/custom-registration-form-builder-with-submission-manager/vulnerability/wordpress-registrationmagic-plugin-6-0-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve.
Details
- CWE(s)