CVE-2023-23678

7.2 HIGH

📋 TL;DR

This vulnerability allows CSV injection attacks in the WP Cookie Consent WordPress plugin. Attackers can embed malicious formulas in CSV exports that execute when opened in spreadsheet software like Excel or LibreOffice. All WordPress sites using affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • WP Cookie Consent (for GDPR, CCPA & ePrivacy) WordPress plugin
Versions: All versions up to and including 2.2.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in CSV export functionality. Requires user interaction (opening CSV file) for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary commands on victim's computer when they open a malicious CSV file, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Attackers trick administrators into downloading and opening malicious CSV exports, leading to local command execution on the administrator's workstation.

🟢

If Mitigated

With proper user awareness training and spreadsheet software security settings, the risk is reduced to potential data manipulation or denial of service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to generate CSV exports. CSV injection techniques are well-documented and easy to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/gdpr-cookie-consent/wordpress-wp-cookie-notice-for-gdpr-ccpa-eprivacy-consent-plugin-2-2-5-csv-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'WP Cookie Consent' and click 'Update Now'. 4. Alternatively, download version 2.2.6+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable CSV Export Feature

all

Temporarily disable CSV export functionality in the plugin settings

Spreadsheet Software Hardening

windows

Configure Excel/LibreOffice to disable automatic formula execution

Excel: File → Options → Trust Center → Trust Center Settings → External Content → Disable automatic update of links
LibreOffice: Tools → Options → LibreOffice → Security → Macro Security → Set to 'Very High'

🧯 If You Can't Patch

  • Restrict plugin access to trusted administrators only
  • Implement user awareness training about opening CSV files from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin: Plugins → Installed Plugins → WP Cookie Consent

Check Version:

wp plugin list --name='WP Cookie Consent' --field=version

Verify Fix Applied:

Verify plugin version is 2.2.6 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Multiple CSV export requests from single user
  • Unusual plugin activity patterns

Network Indicators:

  • CSV file downloads with suspicious content patterns

SIEM Query:

source="wordpress" AND plugin="wp-cookie-consent" AND action="export_csv"

🔗 References

📤 Share & Export