Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14061: CWE-862 Missing Authorization in wplegalpages Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent

0
Medium
VulnerabilityCVE-2025-14061cvecve-2025-14061cwe-862
Published: Wed Dec 17 2025 (12/17/2025, 06:36:58 UTC)
Source: CVE Database V5
Vendor/Project: wplegalpages
Product: Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent

Description

The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the gdpr_delete_policy_data function in all versions up to, and including, 4.0.7. This makes it possible for unauthenticated attackers to permanently delete arbitrary posts, pages, attachments, and other post types by ID.

AI-Powered Analysis

AILast updated: 12/17/2025, 07:15:04 UTC

Technical Analysis

CVE-2025-14061 is a vulnerability identified in the WP Cookie Consent plugin, a WordPress plugin designed to manage cookie banners, consent logs, and compliance with GDPR, CCPA, and ePrivacy regulations. The vulnerability arises from a missing authorization check (CWE-862) in the gdpr_delete_policy_data function, which is responsible for deleting policy-related data. Due to the lack of capability verification, unauthenticated attackers can invoke this function to delete arbitrary WordPress posts, pages, attachments, and other post types by specifying their IDs. This unauthorized deletion can lead to permanent loss of website content and disrupt normal site operations. The vulnerability affects all versions up to and including 4.0.7 of the plugin. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. No patches or exploits are currently publicly available, but the risk remains due to the ease of exploitation and potential impact on data integrity. The vulnerability is particularly concerning for organizations relying on this plugin for GDPR and privacy compliance, as it undermines trust and data management integrity.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized deletion of critical website content, including posts, pages, and media attachments. This compromises data integrity and can disrupt business operations, especially for companies relying on their WordPress sites for customer engagement, e-commerce, or regulatory compliance communication. Given the plugin’s role in GDPR and privacy compliance, exploitation could also indirectly affect compliance posture by removing consent records or policy information, potentially leading to regulatory scrutiny. The impact is more severe for organizations with limited backup and recovery capabilities or those that do not monitor content changes closely. Although availability and confidentiality are not directly impacted, the loss of data integrity can damage reputation and trust with customers and regulators. The medium CVSS score reflects a moderate risk but should not be underestimated given the potential for targeted attacks on high-profile websites.

Mitigation Recommendations

1. Monitor for updates from the WP Cookie Consent plugin vendor and apply security patches immediately once released. 2. Until patches are available, restrict access to WordPress administrative functions and endpoints related to the plugin, using web application firewalls (WAFs) or IP whitelisting. 3. Implement strict file and database backup procedures to enable rapid restoration of deleted content. 4. Enable detailed logging and alerting on deletion events within WordPress to detect suspicious activity promptly. 5. Consider temporarily disabling or replacing the vulnerable plugin with alternative compliant solutions if patching is delayed. 6. Conduct regular security audits and penetration testing focused on plugin vulnerabilities and unauthorized access attempts. 7. Educate website administrators about the risks of unauthorized data deletion and encourage strong credential management to prevent exploitation of other attack vectors that could compound this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T20:05:20.864Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694254ebbd21432f8e5297c0

Added to database: 12/17/2025, 6:59:55 AM

Last enriched: 12/17/2025, 7:15:04 AM

Last updated: 12/17/2025, 9:08:09 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats