The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.
Metrics
Affected Vendors & Products
References
History
Fri, 09 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 09 May 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated. | |
Title | EUCookieLaw <= 2.7.2 - Unauthenticated Arbitrary File Read | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-09T11:11:19.819Z
Updated: 2025-05-09T14:39:27.329Z
Reserved: 2025-04-23T15:56:17.104Z
Link: CVE-2025-3897

Updated: 2025-05-09T14:37:48.833Z

Status : Received
Published: 2025-05-09T12:15:33.370
Modified: 2025-05-09T12:15:33.370
Link: CVE-2025-3897

No data.