CVE-2025-66080: CWE-862 Missing Authorization in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent
Missing Authorization vulnerability in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Cookie Notice for GDPR, CCPA & ePrivacy Consent: from n/a through 4.0.3.
AI Analysis
Technical Summary
CVE-2025-66080 identifies a missing authorization vulnerability (CWE-862) in the WP Cookie Notice for GDPR, CCPA & ePrivacy Consent plugin developed by WP Legal Pages. This plugin is widely used to manage cookie consent banners and compliance with privacy regulations like GDPR, CCPA, and ePrivacy. The vulnerability arises from incorrectly configured access control security levels, allowing unauthorized remote attackers to perform actions that should be restricted. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), the attack can be executed over the network without authentication or user interaction, with low attack complexity. The impact is limited to availability, potentially enabling denial of service or disruption of cookie consent functionality, which could affect website compliance and user experience. The affected versions include all up to 4.0.3, with no patches currently linked. No known exploits have been reported in the wild, but the vulnerability's nature suggests that attackers could disrupt service or manipulate cookie consent mechanisms indirectly by causing failures or misconfigurations. Given the plugin’s role in regulatory compliance, such disruptions could have legal and operational consequences for website operators.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to website availability and compliance with privacy regulations. Disruption of cookie consent mechanisms can lead to non-compliance with GDPR and ePrivacy directives, potentially resulting in regulatory scrutiny or fines. Additionally, service interruptions may degrade user trust and website functionality. Organizations relying on this plugin for cookie consent management are at risk of denial of service attacks that could affect customer-facing websites or internal portals. Since the vulnerability does not impact confidentiality or integrity, direct data breaches are unlikely. However, the indirect effects on compliance and service continuity are significant, especially for sectors with strict privacy obligations such as finance, healthcare, and e-commerce. The lack of authentication requirement increases the risk of automated exploitation attempts, emphasizing the need for timely mitigation.
Mitigation Recommendations
1. Monitor official WP Legal Pages channels and trusted vulnerability databases for patch releases addressing CVE-2025-66080 and apply updates promptly. 2. In the absence of patches, implement web application firewall (WAF) rules to restrict access to sensitive plugin endpoints or functions that may be exploited due to missing authorization. 3. Conduct a thorough review of access control configurations related to the WP Cookie Notice plugin to ensure that administrative or sensitive operations are properly restricted. 4. Limit exposure by restricting plugin management interfaces to trusted IP addresses or internal networks where feasible. 5. Regularly audit website logs for unusual access patterns or repeated unauthorized requests targeting the plugin. 6. Consider temporary disabling or replacing the vulnerable plugin with alternative compliant solutions until a secure version is available. 7. Educate website administrators about the risks of missing authorization vulnerabilities and the importance of timely updates and access control validation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-66080: CWE-862 Missing Authorization in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent
Description
Missing Authorization vulnerability in WP Legal Pages WP Cookie Notice for GDPR, CCPA & ePrivacy Consent allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Cookie Notice for GDPR, CCPA & ePrivacy Consent: from n/a through 4.0.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-66080 identifies a missing authorization vulnerability (CWE-862) in the WP Cookie Notice for GDPR, CCPA & ePrivacy Consent plugin developed by WP Legal Pages. This plugin is widely used to manage cookie consent banners and compliance with privacy regulations like GDPR, CCPA, and ePrivacy. The vulnerability arises from incorrectly configured access control security levels, allowing unauthorized remote attackers to perform actions that should be restricted. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), the attack can be executed over the network without authentication or user interaction, with low attack complexity. The impact is limited to availability, potentially enabling denial of service or disruption of cookie consent functionality, which could affect website compliance and user experience. The affected versions include all up to 4.0.3, with no patches currently linked. No known exploits have been reported in the wild, but the vulnerability's nature suggests that attackers could disrupt service or manipulate cookie consent mechanisms indirectly by causing failures or misconfigurations. Given the plugin’s role in regulatory compliance, such disruptions could have legal and operational consequences for website operators.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to website availability and compliance with privacy regulations. Disruption of cookie consent mechanisms can lead to non-compliance with GDPR and ePrivacy directives, potentially resulting in regulatory scrutiny or fines. Additionally, service interruptions may degrade user trust and website functionality. Organizations relying on this plugin for cookie consent management are at risk of denial of service attacks that could affect customer-facing websites or internal portals. Since the vulnerability does not impact confidentiality or integrity, direct data breaches are unlikely. However, the indirect effects on compliance and service continuity are significant, especially for sectors with strict privacy obligations such as finance, healthcare, and e-commerce. The lack of authentication requirement increases the risk of automated exploitation attempts, emphasizing the need for timely mitigation.
Mitigation Recommendations
1. Monitor official WP Legal Pages channels and trusted vulnerability databases for patch releases addressing CVE-2025-66080 and apply updates promptly. 2. In the absence of patches, implement web application firewall (WAF) rules to restrict access to sensitive plugin endpoints or functions that may be exploited due to missing authorization. 3. Conduct a thorough review of access control configurations related to the WP Cookie Notice plugin to ensure that administrative or sensitive operations are properly restricted. 4. Limit exposure by restricting plugin management interfaces to trusted IP addresses or internal networks where feasible. 5. Regularly audit website logs for unusual access patterns or repeated unauthorized requests targeting the plugin. 6. Consider temporary disabling or replacing the vulnerable plugin with alternative compliant solutions until a secure version is available. 7. Educate website administrators about the risks of missing authorization vulnerabilities and the importance of timely updates and access control validation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:20:58.863Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695450a1db813ff03e2be03b
Added to database: 12/30/2025, 10:22:25 PM
Last enriched: 12/30/2025, 10:27:45 PM
Last updated: 1/7/2026, 4:13:26 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.