VYPR
Medium severity4.3NVD Advisory· Published Jun 27, 2025· Updated Apr 23, 2026

CVE-2025-53197

CVE-2025-53197

Description

Cross-Site Request Forgery (CSRF) vulnerability in cookiebot Cookiebot cookiebot allows Cross Site Request Forgery.This issue affects Cookiebot: from n/a through <= 4.5.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A CSRF vulnerability in the Cookiebot WordPress plugin up to version 4.5.8 allows attackers to force privileged users to perform unintended actions.

Vulnerability

Overview

Cross-Site Request Forgery (CSRF) vulnerability exists in the Cookiebot WordPress plugin versions from n/a through 4.5.8. The plugin fails to properly validate or verify requests, allowing an attacker to craft malicious requests that execute unintended actions on behalf of an authenticated administrator [1].

Exploitation

Conditions

Exploitation requires user interaction - a privileged user must click a malicious link, visit a crafted page, or submit a form while authenticated. This CSRF flaw can be triggered without requiring any additional privileges beyond the victim's existing session [1].

Impact

Successful exploitation enables an attacker to perform unwanted actions under the victim's authentication, such as changing plugin settings, modifying cookie consent configurations, or performing other administrative operations. The CVSS v3 score is 4.3 (Medium), reflecting the need for user interaction [1].

Mitigation

The vulnerability is patched in version 4.5.9. Users are strongly advised to update immediately. For those unable to update, auto-update features can be enabled via Patchstack or manually applying the latest version [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.