
Cloud Vulnerability DB
A community-led vulnerabilities database
The Real Cookie Banner: GDPR & ePrivacy Cookie Consent plugin for WordPress contains a Server-Side Request Forgery (SSRF) vulnerability (CVE-2025-12136) affecting all versions up to and including 5.2.4. The vulnerability was discovered and disclosed on October 23, 2025, and affects the plugin's '/scanner/scan-without-login' REST API endpoint (NVD).
The vulnerability exists due to insufficient validation of user-supplied URLs in the '/scanner/scan-without-login' REST API endpoint. The issue allows authenticated attackers with administrator-level access to make web requests to arbitrary locations originating from the web application. The vulnerability has been assigned a CVSS v3.1 base score of 6.8 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N (Wordfence).
The vulnerability allows authenticated attackers with administrator privileges to query and modify information from internal services via the 'url' parameter. This could potentially lead to unauthorized access to internal resources and exposure of sensitive information. The attacker could use the affected server to make requests to internal network services that are not intended to be accessible (InfoSec Stuff).
Website administrators using Real Cookie Banner are advised to update the plugin as soon as a patched version becomes available. In the meantime, it is recommended to restrict administrator access and monitor for any suspicious activity involving the affected endpoint (InfoSec Stuff).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."