Description
The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.
Published: 2025-05-09
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Patch Now
AI Analysis

Impact

The EUCookieLaw plugin for WordPress contains a flaw that allows an attacker to read the contents of any file on the server. The vulnerability arises from an unvalidated use of the 'file_get_contents' function and is classified as CWE‑22. If exploited, a malicious user can obtain sensitive files such as configuration data, passwords, or other confidential information, compromising the confidentiality of the site.

Affected Systems

The issue affects WordPress sites that have installed the EUCookieLaw plugin versions 2.7.2 or earlier. The plugin must be used in conjunction with a caching solution – for example, W3 Total Cache – that is enabled during the attack window. Sites running an older version of the plugin combined with an active caching plugin are therefore at risk.

Risk and Exploitability

The CVSS score of 5.9 indicates a medium severity vulnerability. The EPSS score is less than 1% and the issue is not listed in CISA’s KEV catalog, suggesting that widespread exploitation is unlikely at present. Nevertheless, the attack vector requires an unauthenticated user to trigger the plugin’s file read logic while a caching plugin is active, making the vulnerability easier to exploit on sites that have both components installed.

Generated by OpenCVE AI on April 20, 2026 at 22:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the EUCookieLaw plugin to version 2.7.3 or later, which removes the vulnerable file_get_contents call.
  • Remove or disable any caching plugin such as W3 Total Cache while the vulnerable EUCookieLaw version is in use.
  • If an upgrade is not immediately possible, restrict the file system permissions for the WordPress content directory and consider implementing a web application firewall rule that blocks requests routed to EUCookieLaw’s cache endpoint.

Generated by OpenCVE AI on April 20, 2026 at 22:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14161 The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00178}

epss

{'score': 0.00186}


Fri, 09 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 May 2025 11:30:00 +0000

Type Values Removed Values Added
Description The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.
Title EUCookieLaw <= 2.7.2 - Unauthenticated Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:36.362Z

Reserved: 2025-04-23T15:56:17.104Z

Link: CVE-2025-3897

cve-icon Vulnrichment

Updated: 2025-05-09T14:37:48.833Z

cve-icon NVD

Status : Deferred

Published: 2025-05-09T12:15:33.370

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3897

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:00:14Z

Weaknesses