Cyber Posture

CVE-2026-4304

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 20.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The WeePie Cookie Allow plugin for WordPress is vulnerable to SQL Injection via the 'consent' parameter in all versions up to, and including, 3.4.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the…

more

existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

Security SummaryAI

CVE-2026-4304 is a SQL injection vulnerability in the WeePie Cookie Allow plugin for WordPress, affecting all versions up to and including 3.4.11. The flaw arises from insufficient escaping of the user-supplied 'consent' parameter and lack of sufficient preparation in existing SQL queries, allowing attackers to append additional SQL queries. Published on 2026-05-05, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is classified under CWE-89.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By manipulating the 'consent' parameter, they can inject SQL payloads into ongoing queries, enabling extraction of sensitive information from the database while impacting only confidentiality.

Mitigation details are outlined in advisories and plugin resources, including the Wordfence threat intelligence page at https://www.wordfence.com/threat-intel/vulnerabilities/id/f783e626-37c0-4ad9-9074-c5332583a0cb?source=cve, the plugin changelog at https://weepie-plugins.com/changelog-weepie-cookie-allow-plugin/, and the plugin page at https://codecanyon.net/item/weepie-cookie-allow-easy-complete-cookie-consent-plugin/10342528.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing WordPress plugin directly enables remote unauthenticated exploitation of internet-facing web applications for database data extraction (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References