Description
The Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website.
Published: 2025-03-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data modification via survey submission
Action: Apply Update
AI Analysis

Impact

The Cookiebot CMP plugin for WordPress contains a missing capability check in its send_uninstall_survey() function. Authenticated users with Subscriber-level access can invoke the function without authorization, allowing them to submit uninstall survey data as if they were the site administrator. This results in unauthorized data modification and potential tampering of survey metrics, which undermines data integrity and could be used to conduct malicious or deceptive surveys.

Affected Systems

The vulnerability affects the Cookiebot CMP plugin by Usercentrics – Automatic Cookie Banner for GDPR/CCPA & Google Consent Mode on WordPress installations. All releases up to and including version 4.4.1 are vulnerable; any site that has not applied a patch or upgrade beyond 4.4.1 remains exposed.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate impact, while the EPSS score of < 1% shows a low likelihood of exploitation in the wild. The bug is not listed in CISA KEV, which further suggests it has not yet been widely exploited. An attacker would need to compromise or steal credentials for a user with Subscriber+ access, or manipulate the site to elevate privileges. Once such access is achieved, the attacker could submit a survey on behalf of the site, potentially defrauding analytics or reporting.

Generated by OpenCVE AI on April 20, 2026 at 23:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cookiebot CMP to a version later than 4.4.1 where the capability check is implemented.
  • Limit the use of Subscriber+ and higher roles to trusted users; remove or downgrade any unnecessary accounts that have those privileges.
  • If an upgrade cannot be performed immediately, disable or remove the send_uninstall_survey function from the plugin, or block its accessibility to non-admin users via custom security rules.

Generated by OpenCVE AI on April 20, 2026 at 23:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6106 The Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website.
History

Thu, 06 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website.
Title Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics <= 4.4.1 - Missing Authorization to Authenticated (Subscriber+) Survey Submission
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:26.804Z

Reserved: 2025-02-24T21:14:10.275Z

Link: CVE-2025-1666

cve-icon Vulnrichment

Updated: 2025-03-06T16:18:46.852Z

cve-icon NVD

Status : Deferred

Published: 2025-03-06T12:15:36.117

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-1666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:45:21Z

Weaknesses