CVE-2025-49390
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in christophrado Cookie Notice & Consent cookie-notice-consent allows Stored XSS.This issue affects Cookie Notice & Consent: from n/a through <= 1.6.4.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in WordPress Cookie Notice & Consent plugin (≤1.6.4) allows attackers to inject malicious scripts via improper input neutralization.
The WordPress Cookie Notice & Consent plugin versions up to and including 1.6.4 contain a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This flaw enables attackers to inject arbitrary scripts that persist in the application.
Exploitation requires a privileged user to perform an action, such as clicking a malicious link or visiting a crafted page [1]. Once triggered, the injected script executes in the context of other users' sessions when they visit the affected site, making it a typical stored XSS attack scenario.
A successful attack could allow a malicious actor to inject scripts that redirect visitors, display advertisements, or embed other HTML payloads [1]. This could compromise site integrity and user trust, and is considered moderately dangerous with potential for mass exploitation campaigns.
Mitigation is available by updating to version 1.6.5 or later [1]. Patchstack has also issued a mitigation rule to block attacks until the update is applied [1]. Users unable to update immediately should consult their hosting provider or web developer for assistance [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.