CVE-2025-1666: CWE-862 Missing Authorization in cookiebot Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics
CVE-2025-1666 is a medium severity vulnerability in the Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics. The flaw arises from a missing authorization check in the send_uninstall_survey() function, allowing authenticated users with Subscriber-level access or higher to submit uninstall surveys on behalf of the website without proper permission. This vulnerability affects all versions up to and including 4. 4. 1. Although it does not impact confidentiality or availability, it allows unauthorized modification of data, specifically the submission of uninstall survey data. Exploitation requires authenticated access but no user interaction beyond that. There are no known exploits in the wild currently, and no patches have been linked yet. Organizations using this plugin should monitor for updates and restrict Subscriber-level permissions where possible to mitigate risk.
AI Analysis
Technical Summary
CVE-2025-1666 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics. The issue stems from the send_uninstall_survey() function lacking a proper capability check, which means that any authenticated user with at least Subscriber-level privileges can invoke this function to submit uninstall survey data on behalf of the website. This unauthorized action could lead to manipulation or falsification of survey data collected by the plugin, potentially skewing analytics or feedback mechanisms. The vulnerability affects all versions up to and including 4.4.1 of the plugin. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring privileges (authenticated users), no user interaction, and limited impact confined to integrity (no confidentiality or availability impact). There are no known public exploits or patches at the time of publication. The vulnerability is primarily a logic flaw in authorization controls within the plugin’s codebase, which could be exploited by low-privileged users to perform unauthorized actions that should be restricted to higher privilege roles or administrators.
Potential Impact
The primary impact of CVE-2025-1666 is unauthorized modification of uninstall survey data, which can affect the integrity of data collected by the Cookiebot CMP plugin. While this does not compromise sensitive user data or system availability, it can undermine trust in the accuracy of user feedback and analytics derived from uninstall surveys. For organizations relying on this data to inform privacy compliance or user experience improvements, the integrity loss could lead to misguided decisions. Additionally, if attackers manipulate uninstall surveys maliciously, it could be used to distort metrics or trigger unintended workflows based on survey results. Since exploitation requires authenticated access at Subscriber-level or above, the risk is limited to environments where such accounts exist and are accessible to potentially malicious insiders or compromised accounts. The vulnerability does not allow remote code execution, data exfiltration, or denial of service, thus limiting its overall impact severity.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately review and restrict Subscriber-level user accounts, ensuring only trusted users have such access. 2) Monitor plugin updates from Usercentrics and apply patches promptly once released. 3) Implement additional access control measures such as two-factor authentication and strong password policies to reduce the risk of account compromise. 4) Conduct code audits or apply custom patches to add proper capability checks in the send_uninstall_survey() function if feasible before official patches are available. 5) Monitor logs for unusual activity related to uninstall survey submissions to detect potential exploitation attempts. 6) Consider temporarily disabling or replacing the plugin if uninstall survey data integrity is critical and no patch is available. 7) Educate users with Subscriber-level access about the risks and encourage reporting of suspicious behavior. These steps go beyond generic advice by focusing on privilege management, monitoring, and proactive code-level controls specific to this plugin’s vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Sweden, Japan, South Korea
CVE-2025-1666: CWE-862 Missing Authorization in cookiebot Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics
Description
CVE-2025-1666 is a medium severity vulnerability in the Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics. The flaw arises from a missing authorization check in the send_uninstall_survey() function, allowing authenticated users with Subscriber-level access or higher to submit uninstall surveys on behalf of the website without proper permission. This vulnerability affects all versions up to and including 4. 4. 1. Although it does not impact confidentiality or availability, it allows unauthorized modification of data, specifically the submission of uninstall survey data. Exploitation requires authenticated access but no user interaction beyond that. There are no known exploits in the wild currently, and no patches have been linked yet. Organizations using this plugin should monitor for updates and restrict Subscriber-level permissions where possible to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-1666 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics. The issue stems from the send_uninstall_survey() function lacking a proper capability check, which means that any authenticated user with at least Subscriber-level privileges can invoke this function to submit uninstall survey data on behalf of the website. This unauthorized action could lead to manipulation or falsification of survey data collected by the plugin, potentially skewing analytics or feedback mechanisms. The vulnerability affects all versions up to and including 4.4.1 of the plugin. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring privileges (authenticated users), no user interaction, and limited impact confined to integrity (no confidentiality or availability impact). There are no known public exploits or patches at the time of publication. The vulnerability is primarily a logic flaw in authorization controls within the plugin’s codebase, which could be exploited by low-privileged users to perform unauthorized actions that should be restricted to higher privilege roles or administrators.
Potential Impact
The primary impact of CVE-2025-1666 is unauthorized modification of uninstall survey data, which can affect the integrity of data collected by the Cookiebot CMP plugin. While this does not compromise sensitive user data or system availability, it can undermine trust in the accuracy of user feedback and analytics derived from uninstall surveys. For organizations relying on this data to inform privacy compliance or user experience improvements, the integrity loss could lead to misguided decisions. Additionally, if attackers manipulate uninstall surveys maliciously, it could be used to distort metrics or trigger unintended workflows based on survey results. Since exploitation requires authenticated access at Subscriber-level or above, the risk is limited to environments where such accounts exist and are accessible to potentially malicious insiders or compromised accounts. The vulnerability does not allow remote code execution, data exfiltration, or denial of service, thus limiting its overall impact severity.
Mitigation Recommendations
To mitigate this vulnerability, organizations should: 1) Immediately review and restrict Subscriber-level user accounts, ensuring only trusted users have such access. 2) Monitor plugin updates from Usercentrics and apply patches promptly once released. 3) Implement additional access control measures such as two-factor authentication and strong password policies to reduce the risk of account compromise. 4) Conduct code audits or apply custom patches to add proper capability checks in the send_uninstall_survey() function if feasible before official patches are available. 5) Monitor logs for unusual activity related to uninstall survey submissions to detect potential exploitation attempts. 6) Consider temporarily disabling or replacing the plugin if uninstall survey data integrity is critical and no patch is available. 7) Educate users with Subscriber-level access about the risks and encourage reporting of suspicious behavior. These steps go beyond generic advice by focusing on privilege management, monitoring, and proactive code-level controls specific to this plugin’s vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-24T21:14:10.275Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b17b7ef31ef0b54e015
Added to database: 2/25/2026, 9:35:19 PM
Last enriched: 2/25/2026, 10:05:36 PM
Last updated: 2/26/2026, 7:24:00 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.