Incorrect Access Control in the AJAX endpoint functionality in jonkastonka Cookies and Content Security Policy plugin through version 2.29 allows remote attackers to cause a denial of service (database server resource exhaustion) via unlimited database write operations to the wp_ajax_nopriv_cacsp_insert_consent_data endpoint.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 21 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Followmedarling Followmedarling cookies And Content Security Policy | |
| CPEs | cpe:2.3:a:followmedarling:cookies_and_content_security_policy:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products | Followmedarling Followmedarling cookies And Content Security Policy | 
Tue, 19 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics | cvssV3_1 
 
 | 
Tue, 19 Aug 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Incorrect Access Control in the AJAX endpoint functionality in jonkastonka Cookies and Content Security Policy plugin through version 2.29 allows remote attackers to cause a denial of service (database server resource exhaustion) via unlimited database write operations to the wp_ajax_nopriv_cacsp_insert_consent_data endpoint. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2025-08-19T00:00:00.000Z
Updated: 2025-08-19T19:53:13.588Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51529
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-19T19:53:08.797Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-08-19T15:15:29.043
Modified: 2025-10-21T14:25:45.693
Link: CVE-2025-51529
 Redhat
                        Redhat
                    No data.