Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14061: CWE-862 Missing Authorization in wplegalpages Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent

0
Medium
VulnerabilityCVE-2025-14061cvecve-2025-14061cwe-862
Published: Wed Dec 17 2025 (12/17/2025, 06:36:58 UTC)
Source: CVE Database V5
Vendor/Project: wplegalpages
Product: Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent

Description

The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the gdpr_delete_policy_data function in all versions up to, and including, 4.0.7. This makes it possible for unauthenticated attackers to permanently delete arbitrary posts, pages, attachments, and other post types by ID.

AI-Powered Analysis

AILast updated: 12/24/2025, 08:19:24 UTC

Technical Analysis

CVE-2025-14061 is a vulnerability identified in the WP Cookie Consent plugin for WordPress, which is widely used to manage cookie banners, consent logs, and compliance with GDPR, CCPA, and ePrivacy regulations. The core issue lies in the gdpr_delete_policy_data function, which lacks proper authorization checks (CWE-862: Missing Authorization). This flaw allows unauthenticated remote attackers to invoke this function and delete arbitrary WordPress posts, pages, attachments, or other post types by specifying their IDs. The vulnerability affects all versions up to and including 4.0.7 of the plugin. The CVSS 3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:L) but not confidentiality or availability. Exploitation could lead to permanent loss of website content, potentially disrupting business operations and damaging reputation. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed. The plugin’s role in GDPR and privacy compliance makes this vulnerability particularly sensitive for organizations subject to European data protection laws. Attackers could leverage this flaw to delete critical compliance records or website content, undermining trust and regulatory adherence.

Potential Impact

For European organizations, the impact of CVE-2025-14061 can be significant despite its medium severity rating. Unauthorized deletion of posts, pages, and attachments can lead to loss of critical website content, including legal notices, privacy policies, and consent records required for GDPR compliance. This can result in regulatory non-compliance, potential fines, and reputational damage. E-commerce sites, government portals, and service providers relying on WordPress with this plugin are particularly vulnerable to operational disruption. The lack of authentication requirement means attackers can exploit this remotely without credentials, increasing risk. While availability is not directly affected, the integrity loss can indirectly cause downtime or degraded user trust. The vulnerability also raises concerns about data governance and auditability, as deleted consent logs may hinder incident investigations or compliance audits. Organizations may face increased costs for content restoration and incident response. Given the plugin’s focus on privacy compliance, this vulnerability undermines the very protections it is intended to enforce.

Mitigation Recommendations

1. Monitor the WP Cookie Consent plugin vendor’s announcements closely and apply official patches immediately once released. 2. Until a patch is available, implement web application firewall (WAF) rules to block unauthorized requests targeting the gdpr_delete_policy_data function or suspicious POST requests that attempt to delete content. 3. Restrict access to WordPress admin endpoints and plugin-specific AJAX handlers by IP whitelisting or authentication enforcement where feasible. 4. Conduct a thorough audit of existing posts, pages, and attachments to establish backups and enable rapid restoration if deletion occurs. 5. Employ WordPress security plugins that can detect and alert on unauthorized content deletions or suspicious activity. 6. Review and harden user roles and permissions within WordPress to minimize exposure. 7. Consider temporarily disabling the vulnerable plugin if it is not critical to operations until a fix is available. 8. Educate site administrators about monitoring logs for unusual deletion requests and maintaining offline backups of critical content. 9. Use intrusion detection systems (IDS) to detect anomalous HTTP requests targeting the plugin’s endpoints. 10. Engage with cybersecurity professionals to perform penetration testing focused on this vulnerability to assess exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T20:05:20.864Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694254ebbd21432f8e5297c0

Added to database: 12/17/2025, 6:59:55 AM

Last enriched: 12/24/2025, 8:19:24 AM

Last updated: 2/5/2026, 11:00:45 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats