CVE-2026-4304
Published: 05 May 2026
Description
The WeePie Cookie Allow plugin for WordPress is vulnerable to SQL Injection via the 'consent' parameter in all versions up to, and including, 3.4.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the…
more
existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Security SummaryAI
CVE-2026-4304 is a SQL injection vulnerability in the WeePie Cookie Allow plugin for WordPress, affecting all versions up to and including 3.4.11. The flaw arises from insufficient escaping of the user-supplied 'consent' parameter and lack of sufficient preparation in existing SQL queries, allowing attackers to append additional SQL queries. Published on 2026-05-05, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is classified under CWE-89.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By manipulating the 'consent' parameter, they can inject SQL payloads into ongoing queries, enabling extraction of sensitive information from the database while impacting only confidentiality.
Mitigation details are outlined in advisories and plugin resources, including the Wordfence threat intelligence page at https://www.wordfence.com/threat-intel/vulnerabilities/id/f783e626-37c0-4ad9-9074-c5332583a0cb?source=cve, the plugin changelog at https://weepie-plugins.com/changelog-weepie-cookie-allow-plugin/, and the plugin page at https://codecanyon.net/item/weepie-cookie-allow-easy-complete-cookie-consent-plugin/10342528.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing WordPress plugin directly enables remote unauthenticated exploitation of internet-facing web applications for database data extraction (T1190).