CVE-2025-24591
Published: 24 January 2025
Summary
CVE-2025-24591 is a medium-severity Missing Authorization (CWE-862) vulnerability in Ninjateam Gdpr Ccpa Compliance \& Cookie Consent Banner. Its CVSS base score is 4.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access, directly preventing low-privileged users from exploiting missing authorization to modify plugin settings or compliance configurations.
Implements least privilege to restrict low-privileged users from performing unauthorized modifications beyond their assigned roles in the WordPress plugin.
Identifies, reports, and applies timely patches to remediate the specific broken access control flaw in ninja-gdpr-compliance versions through 2.7.1.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization in public-facing WordPress plugin enables remote exploitation of the application (T1190) by low-privileged accounts and direct unauthorized modification of stored plugin settings/configurations (T1565.001).
NVD Description
Missing Authorization vulnerability in Ninja Team GDPR CCPA Compliance Support ninja-gdpr-compliance allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GDPR CCPA Compliance Support: from n/a through <= 2.7.1.
Deeper analysisAI
CVE-2025-24591 is a missing authorization vulnerability (CWE-862) in the Ninja Team GDPR CCPA Compliance Support WordPress plugin, also known as ninja-gdpr-compliance. The flaw enables exploiting incorrectly configured access control security levels and affects all versions from n/a through 2.7.1. It carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), indicating a moderate severity issue primarily impacting integrity.
A low-privileged user, such as a subscriber or equivalent authenticated account, can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Exploitation allows limited modification of resources (low integrity impact), potentially enabling unauthorized changes to plugin settings or compliance configurations, though it does not affect confidentiality or availability.
The Patchstack advisory provides details on this broken access control vulnerability in the WordPress GDPR CCPA Compliance Cookie Consent Banner plugin version 2.7.1 and recommends updating to a patched version where available: https://patchstack.com/database/Wordpress/Plugin/ninja-gdpr-compliance/vulnerability/wordpress-gdpr-ccpa-compliance-cookie-consent-banner-plugin-2-7-1-broken-access-control-vulnerability?_s_id=cve.
Details
- CWE(s)