Hi @rajatt777, thanks for reaching out to us.
Our reporting of this seems to be down to a CVE ID being issued, and the vulnerability being verified on Patchstack. Wordfence will report these, even though we weren’t the entity that decided it was a valid vulnerability.
Our Threat Intelligence team have taken a look based on your request and have confirmed it’s an admin+ vulnerability, so only an administrator can create malicious data that can be included in the CSV file. There is a CSV export function in the plugin that can be accessed via the following link:
/wp-admin/admin-post.php?action=gdpr_policies_export.csv
Based on the description, the “gdprpolicies” post type data is added to the CSV file, which can only be accessed by administrators.
It’s best to patch the vulnerability and inform Patchstack as Wordfence will, in turn, also update when a fix is confirmed.
Thanks,
Peter.