Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1666: CWE-862 Missing Authorization in cookiebot Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics

0
Medium
VulnerabilityCVE-2025-1666cvecve-2025-1666cwe-862
Published: Thu Mar 06 2025 (03/06/2025, 11:11:01 UTC)
Source: CVE Database V5
Vendor/Project: cookiebot
Product: Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics

Description

CVE-2025-1666 is a medium severity vulnerability in the Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics. The flaw arises from a missing authorization check in the send_uninstall_survey() function, allowing authenticated users with Subscriber-level access or higher to submit uninstall surveys on behalf of the website without proper permission. This vulnerability affects all versions up to and including 4. 4. 1. Although it does not impact confidentiality or availability, it allows unauthorized modification of data, specifically the submission of uninstall survey data. Exploitation requires authenticated access but no user interaction beyond that. There are no known exploits in the wild currently, and no patches have been linked yet. Organizations using this plugin should monitor for updates and restrict Subscriber-level permissions where possible to mitigate risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:05:36 UTC

Technical Analysis

CVE-2025-1666 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics. The issue stems from the send_uninstall_survey() function lacking a proper capability check, which means that any authenticated user with at least Subscriber-level privileges can invoke this function to submit uninstall survey data on behalf of the website. This unauthorized action could lead to manipulation or falsification of survey data collected by the plugin, potentially skewing analytics or feedback mechanisms. The vulnerability affects all versions up to and including 4.4.1 of the plugin. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network, low attack complexity, requiring privileges (authenticated users), no user interaction, and limited impact confined to integrity (no confidentiality or availability impact). There are no known public exploits or patches at the time of publication. The vulnerability is primarily a logic flaw in authorization controls within the plugin’s codebase, which could be exploited by low-privileged users to perform unauthorized actions that should be restricted to higher privilege roles or administrators.

Potential Impact

The primary impact of CVE-2025-1666 is unauthorized modification of uninstall survey data, which can affect the integrity of data collected by the Cookiebot CMP plugin. While this does not compromise sensitive user data or system availability, it can undermine trust in the accuracy of user feedback and analytics derived from uninstall surveys. For organizations relying on this data to inform privacy compliance or user experience improvements, the integrity loss could lead to misguided decisions. Additionally, if attackers manipulate uninstall surveys maliciously, it could be used to distort metrics or trigger unintended workflows based on survey results. Since exploitation requires authenticated access at Subscriber-level or above, the risk is limited to environments where such accounts exist and are accessible to potentially malicious insiders or compromised accounts. The vulnerability does not allow remote code execution, data exfiltration, or denial of service, thus limiting its overall impact severity.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Immediately review and restrict Subscriber-level user accounts, ensuring only trusted users have such access. 2) Monitor plugin updates from Usercentrics and apply patches promptly once released. 3) Implement additional access control measures such as two-factor authentication and strong password policies to reduce the risk of account compromise. 4) Conduct code audits or apply custom patches to add proper capability checks in the send_uninstall_survey() function if feasible before official patches are available. 5) Monitor logs for unusual activity related to uninstall survey submissions to detect potential exploitation attempts. 6) Consider temporarily disabling or replacing the plugin if uninstall survey data integrity is critical and no patch is available. 7) Educate users with Subscriber-level access about the risks and encourage reporting of suspicious behavior. These steps go beyond generic advice by focusing on privilege management, monitoring, and proactive code-level controls specific to this plugin’s vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-24T21:14:10.275Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b17b7ef31ef0b54e015

Added to database: 2/25/2026, 9:35:19 PM

Last enriched: 2/25/2026, 10:05:36 PM

Last updated: 2/26/2026, 7:24:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats