Complianz – GDPR/CCPA Cookie Consent Vulnerability (Medium) – CVE-2…

Complianz – GDPR/CCPA Cookie Consent Vulnerability (Medium) – CVE-2…

by | Feb 18, 2026 | Plugins

Attack Vectors

Medium severity (CVSS 6.4) vulnerability CVE-2025-11185 affects the WordPress plugin Complianz – GDPR/CCPA Cookie Consent (slug: complianz-gdpr) in versions up to and including 7.4.3.

The issue is an authenticated stored cross-site scripting (XSS) flaw involving the cmplz-accept-link shortcode. An attacker who already has a WordPress account with Contributor access or higher can place malicious script content into a page or post that uses the shortcode, causing the script to run when someone later visits the affected page.

This matters most for organizations that allow multiple internal users, agencies, contractors, or partners to publish or submit content—because the attack leverages a legitimate workflow (shortcodes inside content) rather than an obvious “break-in” attempt.

Security Weakness

According to Wordfence, the vulnerability stems from insufficient input sanitization and output escaping of user-supplied shortcode attributes in the cmplz-accept-link shortcode. In plain terms: the plugin does not adequately validate and safely display certain inputs, which can allow embedded scripts to be stored and later executed in a visitor’s browser.

Because it is stored, the malicious code can persist on the site until discovered and removed. Because it is authenticated, the primary risk arises when an attacker gains (or abuses) a lower-level account, such as a Contributor, or when role controls and publishing workflows are too permissive.

Technical or Business Impacts

Stored XSS can directly affect customer trust and revenue by enabling page defacement, deceptive pop-ups, form manipulation, or invisible redirects—actions that can undermine marketing campaigns and conversion funnels without obvious signs in analytics until damage is done.

For leadership and compliance teams, the business risk includes potential brand damage, loss of lead integrity (tampered forms or tracking), and privacy/compliance exposure if scripts are used to interfere with user interactions or to capture data entered into pages. The CVSS vector indicates the attack is network reachable, requires low complexity, needs low privileges, and can affect other security boundaries (S:C), which can amplify impact in real-world environments.

Recommended remediation: update Complianz – GDPR/CCPA Cookie Consent to version 7.4.4 or newer, which contains a patch for this issue. Source and details: Wordfence vulnerability record and CVE-2025-11185.

Similar Attacks

Stored XSS in widely used web platforms has been repeatedly leveraged to alter user experiences, inject unauthorized content, and undermine trust. A few well-documented examples include:

CISA alert on BlackMatter ransomware (illustrates how attackers often start with access and then expand impact across business systems and operations).

CISA Advisory AA22-110A on Conti ransomware (highlights how compromised accounts and web-facing assets can be part of broader campaigns that disrupt operations and damage reputation).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers