Description
The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
* (semver)
Timeline
| 2025-05-08: | Disclosed |
Credits
Nicolai Hellesnes
References
www.wordfence.com/...-8490-4e70-b2d9-4f01a1ed3305?source=cve
plugins.trac.wordpress.org/...nk/templates/EUCookieCache.php
plugins.trac.wordpress.org/changeset/3288917/