Cookie Banner for GDPR / CCPA – WPLP Cookie Consent Vulnerability (…

Cookie Banner for GDPR / CCPA – WPLP Cookie Consent Vulnerability (…

by | Feb 18, 2026 | Plugins

Attack Vectors

High severity (CVSS 7.5) vulnerability tracked as CVE-2025-11754 affects the WordPress plugin Cookie Banner for GDPR / CCPA – WPLP Cookie Consent (slug: gdpr-cookie-consent) in versions up to and including 4.1.2.

The primary attack path is remote and requires no login: an unauthenticated attacker can query the plugin’s REST API endpoint gdpr/v1/settings to retrieve sensitive plugin configuration data. This is a low-effort, high-impact data exposure scenario because the endpoint can be accessed over the internet when the site is reachable.

Organizations are most at risk when the affected plugin is installed and the website is publicly accessible, including corporate marketing sites, campaign microsites, and multi-site environments where plugin settings may be reused across properties.

Security Weakness

The issue is a missing authorization (capability) check on a sensitive REST API endpoint. In plain terms, the plugin exposes its settings without confirming that the requester is allowed to see them.

According to the published advisory, exposed settings can include API tokens, email addresses, account IDs, and site keys. While this weakness does not indicate attackers can change site content, it does enable them to collect data that can be leveraged for follow-on attacks or misuse of integrated services.

Remediation is straightforward: update the plugin to version 4.1.3 or newer, which includes a patch for this authorization gap.

Technical or Business Impacts

Credential and integration exposure: If API tokens or site keys are leaked, attackers may be able to interact with connected services in unintended ways, potentially increasing costs, disrupting marketing operations, or weakening security controls in adjacent platforms.

Privacy and compliance risk: Exposed email addresses and account identifiers can create privacy obligations and raise questions during audits. For teams accountable to GDPR/CCPA/ePrivacy expectations, data exposure tied to a consent-related plugin can be especially sensitive from a trust and governance perspective.

Brand and reputation impact: Even if no content is altered, public disclosure that a “consent” tool exposed sensitive settings can damage stakeholder confidence, affect customer trust, and complicate enterprise sales and partner reviews.

Operational disruption: Response activities can include rotating keys/tokens, reviewing third-party integrations, and conducting forensic checks—time that pulls marketing, IT, compliance, and leadership away from core priorities.

Similar Attacks

Unauthenticated data exposure through misprotected endpoints and interfaces is a recurring pattern across web platforms. Here are a few well-known real-world examples that illustrate how “read access” weaknesses can still become major business events:

Equifax (2017) — widely cited breach that highlighted how internet-facing weaknesses can lead to large-scale sensitive data exposure and long-term reputational and regulatory consequences.

FTC settlement coverage related to Equifax — demonstrates the financial and compliance fallout that can follow data exposure events.

Facebook / Cambridge Analytica — shows how exposed or misused data can become a governance, trust, and brand crisis even beyond purely technical impacts.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers