CVE-2025-66080: CWE-862 Missing Authorization in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent
Missing Authorization vulnerability in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Cookie Notice for GDPR, CCPA & ePrivacy Consent: from n/a through 4.0.3.
AI Analysis
Technical Summary
CVE-2025-66080 identifies a Missing Authorization vulnerability (CWE-862) in the WP Cookie Notice for GDPR, CCPA & ePrivacy Consent plugin developed by WP Legal Pages. This plugin is widely used to manage cookie consent banners and compliance with privacy regulations such as GDPR, CCPA, and ePrivacy. The vulnerability arises from incorrectly configured access control mechanisms that fail to properly restrict unauthorized users from performing certain actions within the plugin. Specifically, the flaw allows remote attackers with no privileges and without requiring user interaction to exploit the plugin over the network. While the vulnerability does not compromise confidentiality or integrity of data, it can impact availability by allowing unauthorized changes or disruptions to the cookie notice functionality, potentially affecting website compliance and user experience. The affected versions include all versions up to 4.0.3, with no patch links currently available, indicating that a fix may be pending. The CVSS 3.1 base score is 5.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, meaning network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and impact limited to availability. No known exploits have been reported in the wild as of the published date (December 30, 2025).
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability and proper functioning of cookie consent mechanisms, which are critical for compliance with stringent privacy laws such as GDPR and ePrivacy Directive. Disruption or unauthorized modification of cookie notices can lead to non-compliance, resulting in regulatory fines and reputational damage. Additionally, compromised cookie consent functionality may erode user trust and negatively impact website usability. Since the vulnerability does not affect confidentiality or integrity, direct data breaches are unlikely. However, the availability impact could cause service interruptions or misrepresentation of consent status. Organizations relying on this plugin for legal compliance and user consent management should consider the operational and regulatory risks. The lack of required privileges or user interaction makes exploitation easier, increasing the likelihood of automated or opportunistic attacks if a public exploit emerges.
Mitigation Recommendations
Organizations should monitor WP Legal Pages’ official channels for patches addressing CVE-2025-66080 and apply updates promptly once available. In the interim, administrators should audit and tighten access controls related to cookie notice management, ensuring that only authorized users can modify cookie consent settings. Implementing web application firewalls (WAF) with rules to detect and block suspicious requests targeting the plugin’s endpoints can reduce exposure. Regularly review plugin configurations and logs for anomalous activity. Consider isolating or restricting access to administrative interfaces managing cookie notices. Additionally, organizations should maintain comprehensive backups and incident response plans to quickly recover from potential disruptions. Educating site administrators about this vulnerability and encouraging minimal plugin usage or alternative solutions with stronger security postures may also reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-66080: CWE-862 Missing Authorization in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent
Description
Missing Authorization vulnerability in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Cookie Notice for GDPR, CCPA & ePrivacy Consent: from n/a through 4.0.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-66080 identifies a Missing Authorization vulnerability (CWE-862) in the WP Cookie Notice for GDPR, CCPA & ePrivacy Consent plugin developed by WP Legal Pages. This plugin is widely used to manage cookie consent banners and compliance with privacy regulations such as GDPR, CCPA, and ePrivacy. The vulnerability arises from incorrectly configured access control mechanisms that fail to properly restrict unauthorized users from performing certain actions within the plugin. Specifically, the flaw allows remote attackers with no privileges and without requiring user interaction to exploit the plugin over the network. While the vulnerability does not compromise confidentiality or integrity of data, it can impact availability by allowing unauthorized changes or disruptions to the cookie notice functionality, potentially affecting website compliance and user experience. The affected versions include all versions up to 4.0.3, with no patch links currently available, indicating that a fix may be pending. The CVSS 3.1 base score is 5.3, indicating medium severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, meaning network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and impact limited to availability. No known exploits have been reported in the wild as of the published date (December 30, 2025).
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability and proper functioning of cookie consent mechanisms, which are critical for compliance with stringent privacy laws such as GDPR and ePrivacy Directive. Disruption or unauthorized modification of cookie notices can lead to non-compliance, resulting in regulatory fines and reputational damage. Additionally, compromised cookie consent functionality may erode user trust and negatively impact website usability. Since the vulnerability does not affect confidentiality or integrity, direct data breaches are unlikely. However, the availability impact could cause service interruptions or misrepresentation of consent status. Organizations relying on this plugin for legal compliance and user consent management should consider the operational and regulatory risks. The lack of required privileges or user interaction makes exploitation easier, increasing the likelihood of automated or opportunistic attacks if a public exploit emerges.
Mitigation Recommendations
Organizations should monitor WP Legal Pages’ official channels for patches addressing CVE-2025-66080 and apply updates promptly once available. In the interim, administrators should audit and tighten access controls related to cookie notice management, ensuring that only authorized users can modify cookie consent settings. Implementing web application firewalls (WAF) with rules to detect and block suspicious requests targeting the plugin’s endpoints can reduce exposure. Regularly review plugin configurations and logs for anomalous activity. Consider isolating or restricting access to administrative interfaces managing cookie notices. Additionally, organizations should maintain comprehensive backups and incident response plans to quickly recover from potential disruptions. Educating site administrators about this vulnerability and encouraging minimal plugin usage or alternative solutions with stronger security postures may also reduce risk.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:20:58.863Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695450a1db813ff03e2be03b
Added to database: 12/30/2025, 10:22:25 PM
Last enriched: 1/21/2026, 12:22:47 AM
Last updated: 2/5/2026, 4:28:42 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
UnknownCVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.