Home

Description

WordPress Server Log Viewer 1.0 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts through unfiltered log file paths. Attackers can add log files with embedded XSS payloads that will execute when viewed in the WordPress admin interface.

PUBLISHED Reserved 2026-02-11 | Published 2026-02-11 | Updated 2026-02-11 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

1.0
affected

Credits

strider finder

References

www.exploit-db.com/exploits/47419 (ExploitDB-47419) exploit

github.com/anttiviljami/wp-server-log-viewer (WP Server Log Viewer GitHub Repository) product

www.vulncheck.com/...logfile-persistent-cross-site-scripting (VulnCheck Advisory: WP Server Log Viewer 1.0 - 'logfile' Persistent Cross-Site Scripting) third-party-advisory

cve.org (CVE-2019-25315)

nvd.nist.gov (CVE-2019-25315)

Download JSON