Description
The Cookie Notice & Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uuid parameter in all versions up to, and including, 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-10-09
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The Cookie Notice & Consent WordPress plugin stores data supplied via the uuid parameter without proper sanitization or output escaping. As a result, an unauthenticated attacker can inject arbitrary JavaScript into the stored record. When the plugin renders that data in any page viewed by a user, the malicious script executes in the victim’s browser context, enabling session hijacking, credential theft, or defacement of the site’s content. This vulnerability is a classic example of CWE‑80, delivering cross‑site scripting payloads that compromise confidentiality, integrity, and potentially availability of the user experience.

Affected Systems

Any WordPress installation running Cookie Notice & Consent version 1.6.5 or earlier is affected. Versions newer than 1.6.5 are not impacted, as the issue was addressed in later releases.

Risk and Exploitability

The CVSS base score of 7.2 indicates high severity, while an EPSS score of less than 1% suggests low probability of exploitation today. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers would target the plugin’s logging or configuration endpoints with a crafted uuid value that contains malicious script. Once stored, the script is rendered whenever a page retrieves that value, causing it to execute in the victim’s browser. The description does not specify the exact endpoint or whether authentication is required, so the details about an exposed admin URL or fuzzing attempts are inferred. The lack of input validation or output escaping on the uuid field is the core weakness enabling this exploit path.

Generated by OpenCVE AI on April 27, 2026 at 23:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Cookie Notice & Consent plugin to a version newer than 1.6.5, which contains the fix for the XSS flaw.
  • If an upgrade is not feasible immediately, block or sanitize incoming requests to the uuid parameter using a Web Application Firewall or custom input filtering to remove potentially malicious characters.
  • Audit the database or logging tables for stored entries containing unexpected script tags or other XSS patterns and remove or replace them to mitigate any existing injected code.

Generated by OpenCVE AI on April 27, 2026 at 23:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Christophrado
Christophrado cookie Notice & Consent
Wordpress
Wordpress wordpress
Vendors & Products Christophrado
Christophrado cookie Notice & Consent
Wordpress
Wordpress wordpress

Thu, 09 Oct 2025 02:15:00 +0000

Type Values Removed Values Added
Description The Cookie Notice & Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uuid parameter in all versions up to, and including, 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Cookie Notice & Consent <= 1.6.5 - Unauthenticated Stored Cross-Site Scripting
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Christophrado Cookie Notice & Consent
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:32:52.526Z

Reserved: 2025-09-15T19:39:18.733Z

Link: CVE-2025-10496

cve-icon Vulnrichment

Updated: 2025-10-09T14:32:27.279Z

cve-icon NVD

Status : Deferred

Published: 2025-10-09T02:15:40.750

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:45:15Z

Weaknesses