Cyber Posture

CVE-2025-24591

Medium

Published: 24 January 2025

Published
24 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0022 44.9th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.

Security Summary

CVE-2025-24591 is a missing authorization vulnerability (CWE-862) in the Ninja Team GDPR CCPA Compliance Support WordPress plugin, also known as ninja-gdpr-compliance. The flaw enables exploiting incorrectly configured access control security levels and affects all versions from n/a through 2.7.1. It carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), indicating a moderate severity issue primarily impacting integrity.

A low-privileged user, such as a subscriber or equivalent authenticated account, can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Exploitation allows limited modification of resources (low integrity impact), potentially enabling unauthorized changes to plugin settings or compliance configurations, though it does not affect confidentiality or availability.

The Patchstack advisory provides details on this broken access control vulnerability in the WordPress GDPR CCPA Compliance Cookie Consent Banner plugin version 2.7.1 and recommends updating to a patched version where available: https://patchstack.com/database/Wordpress/Plugin/ninja-gdpr-compliance/vulnerability/wordpress-gdpr-ccpa-compliance-cookie-consent-banner-plugin-2-7-1-broken-access-control-vulnerability?_s_id=cve.

Details

CWE(s)
CWE-862

Affected Products

ninjateam
gdpr ccpa compliance \& cookie consent banner
≤ 2.7.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Missing authorization in public-facing WordPress plugin enables remote exploitation of the application (T1190) by low-privileged accounts and direct unauthorized modification of stored plugin settings/configurations (T1565.001).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References