Critically identified and resolved security issues caused by inappropriate access controls in one WordPress plugin designed for GDPR cookie compliance. Unfortunately, however, hundreds of thousands of websites may still be vulnerable to attack.
The GDPR Cookie Consent plugin, provided by Cookie Law Info developer through WebToffee, is designed to ensure that sites comply with the EU General Data Protection (GDPR). Specifically, it is about obtaining consent for cookies from visitors, creating a privacy & cookies page and activating banners that prove compliance.
The plugin contains more than 700.000 active installations according to the WordPress library.
The news was born on January 28, 2019, when NinTechNet researcher Jerome Bruandet discovered a vulnerability affecting GDPR Cookie Consent version 1.8.2 and earlier. Essentially, this is a critical issue caused by failed capability checks, leading to validated cross-site scripting (XSS) and possible privilege escalation.
How did the error occur?
A sensitive one is responsible for everything AJAX endpoint where failure to perform audits meant that three actions were reported: get_policy_pageid, autosave_contant_data and save_contentdata.
According to WordPress "because the AJAX endpoint was intended to be accessible only to managers, the vulnerability allows subscriber users to perform a series of actions that can compromise site security. "
Thus malicious payloads are executed when users visit http: // / cli-policy-preview /
In addition, save_contentdata is intended for use in creating or updating the post used for the policy page, so the report could allow intruders to change the content of the post in a variety of ways.
The use of this energy can lead to material deletion or malicious taxation, including "formatted text, local or remote images as well as hyperlinks, and passwords.
Users of the GDPR Cookie plugin are advised to make sure they are using the latest version of the software, 1.8.3, to stay protected. Until this article was written, 64,5% of users have been updated - with thousands of websites still exposed.