Description
The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to retrieve sensitive plugin settings including API tokens, email addresses, account IDs, and site keys.
Published: 2026-02-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Sensitive Information Exposure
Action: Patch Immediately
AI Analysis

Impact

The GDPR Cookie Consent plugin for WordPress implements a REST API endpoint at /wp-json/gdpr/v1/settings that should be protected by a capability check. In all affected releases up to and including version 4.1.2 the plugin fails to verify that the requester has permission to access configuration settings. Consequently any user—authenticated or not—can retrieve the plugin’s configuration, which contains API tokens, email addresses, account identifiers, and site keys. This leakage allows an attacker to compromise third‑party integrations and potentially gain unauthorized access to services linked to those credentials, leading to a breach of confidentiality and resources used by the site.

Affected Systems

All WordPress sites running the WPLP Cookie Consent plugin version 4.1.2 or earlier are vulnerable. The plugin, named Cookie Banner for GDPR / CCPA – WPLP Cookie Consent, is distributed through the WordPress plugin repository and can be installed on any standard WordPress installation.

Risk and Exploitability

The CVSS score of 7.5 indicates significant severity, while the EPSS score of less than 1% suggests that widespread exploitation is currently not common but still possible. The issue is not listed in the CISA KEV catalog. The attack can be carried out from a remote web request to the exposed REST endpoint without authentication, making the vulnerability trivial to exploit for an attacker who can reach the site. Successful exploitation reveals sensitive configuration data that could enable further attacks such as credential stuffing or service takeover.

Generated by OpenCVE AI on April 22, 2026 at 12:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WPLP Cookie Consent plugin to the latest release that includes the authentication check for the /gdpr/v1/settings endpoint.
  • If an update cannot be applied immediately, block unauthenticated requests to the /wp-json/gdpr/v1/settings endpoint using a web application firewall, .htaccess rule, or by disabling the endpoint through custom code.
  • Review the site’s REST API configuration to ensure that all endpoints require proper capability checks and remove or harden any that do not.

Generated by OpenCVE AI on April 22, 2026 at 12:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wplegalpages
Wplegalpages cookie Banner For Gdpr / Ccpa – Wplp Cookie Consent
Vendors & Products Wordpress
Wordpress wordpress
Wplegalpages
Wplegalpages cookie Banner For Gdpr / Ccpa – Wplp Cookie Consent

Thu, 19 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to retrieve sensitive plugin settings including API tokens, email addresses, account IDs, and site keys.
Title Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent <= 4.1.2 - Missing Authorization to Sensitive Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
Wplegalpages Cookie Banner For Gdpr / Ccpa – Wplp Cookie Consent
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:48:32.726Z

Reserved: 2025-10-14T17:51:56.180Z

Link: CVE-2025-11754

cve-icon Vulnrichment

Updated: 2026-02-19T17:23:20.852Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:26.777

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11754

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:15:16Z

Weaknesses