Description
The Activity Log for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the winter_activity_log_action() function in all versions up to, and including, 1.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view potentially sensitive information (e.g., the password of a higher level user, such as an administrator) contained in the exposed log files.
Published: 2026-02-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the winter_activity_log_action() function of the Activity Log for WordPress plugin, where a missing capability check allows an attacker to read log files. An authenticated user with Subscriber level or higher can trigger this function and obtain content that may contain sensitive data such as the passwords of higher‑privilege users. This flaw therefore enables credential disclosure and potential escalation of privilege for an authenticated attacker.

Affected Systems

Switcorp Activity Log for WordPress plugin versions 1.2.8 and any earlier release are affected. The issue is present in all builds up to and including 1.2.8.

Risk and Exploitability

The vulnerability has a severity score of 6.5, indicating moderate risk, while the likelihood of exploitation is low, with a probability estimate below 1%. The attack requires an authenticated user with a Subscriber role or higher to trigger the action and read the log file. No additional privileges or special setup are needed, so any site running the vulnerable plugin can be impacted. The vulnerability is not listed in the national known exploited vulnerability catalog.

Generated by OpenCVE AI on April 15, 2026 at 20:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Activity Log for WordPress plugin to the latest version that includes the missing capability check (any release after 1.2.8).
  • If an update is not immediately possible, modify the plugin (or use a code snippet) to restrict the winter_activity_log_action() endpoint so that only users with Administrator capability can execute it.
  • Delete any existing log files that may contain sensitive data to remove already exposed credentials.

Generated by OpenCVE AI on April 15, 2026 at 20:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Switcorp
Switcorp activity Log For Wordpress
Wordpress
Wordpress wordpress
Vendors & Products Switcorp
Switcorp activity Log For Wordpress
Wordpress
Wordpress wordpress

Thu, 12 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 13:00:00 +0000

Type Values Removed Values Added
Description The Activity Log for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the winter_activity_log_action() function in all versions up to, and including, 1.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view potentially sensitive information (e.g., the password of a higher level user, such as an administrator) contained in the exposed log files.
Title Activity Log for WordPress <= 1.2.8 - Missing Authorization to Sensitive Information Exposure via Log File
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Switcorp Activity Log For Wordpress
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:55:44.269Z

Reserved: 2026-01-30T00:45:01.261Z

Link: CVE-2026-1671

cve-icon Vulnrichment

Updated: 2026-02-12T14:15:36.226Z

cve-icon NVD

Status : Deferred

Published: 2026-02-12T13:15:49.880

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses