CVE-2026-4304
WeePie · Cookie Allow
The WeePie Cookie Allow plugin for WordPress is vulnerable to SQL injection via the 'consent' parameter, posing a risk to database security.
Executive summary
The WeePie Cookie Allow plugin contains a high-severity SQL injection vulnerability that could allow unauthorized database access and data manipulation.
Vulnerability
This vulnerability is an SQL injection flaw triggered via the 'consent' parameter. By supplying crafted input, an attacker can execute arbitrary SQL commands against the WordPress database.
Business impact
A CVSS score of 7.5 highlights the potential for significant impact, including the compromise of sensitive user consent data and broader database exposure. This poses a compliance risk and a direct threat to the security posture of the affected WordPress site.
Remediation
Immediate Action: Update the WeePie Cookie Allow plugin to the latest version as soon as the vendor releases a patch.
Proactive Monitoring: Regularly review application and database error logs for signs of injection attempts or unusual query execution patterns.
Compensating Controls: Implement WAF rules specifically configured to sanitize or block input to the 'consent' parameter to mitigate the risk until a patch is applied.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate remediation is essential to prevent unauthorized access to the database. Given the nature of the vulnerability, prompt updates are the most effective way to eliminate this security risk.