Arbitrary File Read Vulnerability in EUCookieLaw Plugin for WordPress
CVE-2025-3897

5.9MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
9 May 2025

What is CVE-2025-3897?

The EUCookieLaw plugin for WordPress is susceptible to an Arbitrary File Read vulnerability, allowing unauthenticated attackers to access the content of arbitrary files on the server through the 'file_get_contents' function. This poses a significant risk as it can expose sensitive information stored in files. The exploit requires that a caching plugin, such as W3 Total Cache, is installed and activated, giving attackers a pathway to compromise server security and access confidential data.

Affected Version(s)

EUCookieLaw * <= 2.7.2

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nicolai Hellesnes
.
CVE-2025-3897 : Arbitrary File Read Vulnerability in EUCookieLaw Plugin for WordPress