Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14061: CWE-862 Missing Authorization in wplegalpages Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent

0
Medium
VulnerabilityCVE-2025-14061cvecve-2025-14061cwe-862
Published: Wed Dec 17 2025 (12/17/2025, 06:36:58 UTC)
Source: CVE Database V5
Vendor/Project: wplegalpages
Product: Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent

Description

The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the gdpr_delete_policy_data function in all versions up to, and including, 4.0.7. This makes it possible for unauthenticated attackers to permanently delete arbitrary posts, pages, attachments, and other post types by ID.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:46:07 UTC

Technical Analysis

CVE-2025-14061 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WP Cookie Consent plugin, which is widely used in WordPress sites to manage cookie banners and compliance with GDPR, CCPA, and ePrivacy regulations. The vulnerability arises from the gdpr_delete_policy_data function lacking proper capability checks, enabling unauthenticated attackers to invoke this function and delete arbitrary WordPress content by specifying post IDs. This includes posts, pages, attachments, and other custom post types, effectively allowing permanent deletion of site content without any authentication or user interaction. The vulnerability affects all versions up to and including 4.0.7 of the plugin. The CVSS 3.1 base score is 5.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, as confidentiality and availability are not directly affected. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to website content integrity, particularly for organizations relying on this plugin for cookie consent management and compliance.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of website content through deletion of posts, pages, attachments, and other post types. This can lead to data loss, disruption of website functionality, and potential reputational damage. For organizations, especially those subject to GDPR, CCPA, or ePrivacy regulations, this could also result in compliance issues if critical policy or consent data is deleted. Since the exploit requires no authentication and can be executed remotely, any WordPress site using the vulnerable plugin is at risk. The loss of content could disrupt business operations, customer trust, and SEO rankings. However, the vulnerability does not expose confidential data nor cause denial of service directly, limiting the scope of impact to integrity. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers could develop exploits. Organizations with large content repositories or regulatory compliance dependencies are particularly vulnerable.

Mitigation Recommendations

Immediate mitigation should focus on updating the WP Cookie Consent plugin to a version that includes proper authorization checks once available. Until a patch is released, organizations should restrict access to the WordPress REST API endpoints or functions related to gdpr_delete_policy_data, using web application firewalls (WAFs) or custom access controls to block unauthorized requests. Implementing strict role-based access controls and monitoring for unusual deletion activities in logs can help detect exploitation attempts. Regular backups of WordPress content are critical to enable recovery from unauthorized deletions. Additionally, disabling or removing the vulnerable plugin temporarily can be considered if the risk outweighs the functionality provided. Security teams should also monitor threat intelligence sources for emerging exploits and apply patches promptly when released. Finally, reviewing and hardening WordPress security configurations and limiting plugin usage to trusted, actively maintained plugins reduces overall risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T20:05:20.864Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694254ebbd21432f8e5297c0

Added to database: 12/17/2025, 6:59:55 AM

Last enriched: 2/27/2026, 10:46:07 AM

Last updated: 3/24/2026, 10:45:46 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses