Description
The Activity Logs, User Activity Tracking, Multisite Activity Log from Logtivity plugin for WordPress is vulnerable to Authentication Bypass to Information Disclosure in versions up to, and including, 3.3.6. This is due to a logic flaw in the verifyAuthorization method where requests without an Authorization header skip Bearer token validation and fall through to an unconditional return true statement, bypassing all authentication checks. This makes it possible for unauthenticated attackers to access the /wp-json/logtivity/v1/options REST API endpoint and retrieve all plugin configuration options, including the logtivity_site_api_key which can be used to impersonate the site in API calls to the Logtivity service.
Published: 2026-05-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Logtivity plugin for WordPress contains a logic defect in its verifyAuthorization function. When a request arrives without an Authorization header, the plugin bypasses token checks and returns true, effectively skipping all authentication. This allows an unauthenticated attacker to call the /wp-json/logtivity/v1/options endpoint and retrieve full plugin configuration, including the logtivity_site_api_key used to impersonate the site in external Logtivity API calls.

Affected Systems

Affected products are the Logtivity Activity Logs, User Activity Tracking, Multisite Activity Log plugin versions up to and including 3.3.6. Versions 3.3.7 and later contain the fix.

Risk and Exploitability

Based on the description, the vulnerability can be exploited by sending unauthenticated HTTP requests to a publicly accessible REST endpoint; thus the likely attack vector is network access. The CVSS score of 5.3 indicates moderate severity. Because the REST endpoint is reachable without authentication, attackers can obtain the plugin’s configuration options, including the logtivity_site_api_key, which can then be used to impersonate the site in external API calls. EPSS is not available, so we cannot quantify exploitation likelihood, and the vulnerability is not listed in the CISA KEV catalog. The combination of moderate severity and public network exposure makes this issue actionable for threat actors.

Generated by OpenCVE AI on May 9, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Logtivity plugin to version 3.3.7 or later where the authorization check is fixed
  • If an immediate upgrade is not possible, block or restrict access to the /wp-json/logtivity/v1/options endpoint, for example by using a firewall or WAF rule that denies unauthenticated requests
  • Alternatively, ensure the WordPress REST API is configured to require authentication for all custom endpoints, or remove the Logtivity REST API entirely when not needed.

Generated by OpenCVE AI on May 9, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description The Activity Logs, User Activity Tracking, Multisite Activity Log from Logtivity plugin for WordPress is vulnerable to Authentication Bypass to Information Disclosure in versions up to, and including, 3.3.6. This is due to a logic flaw in the verifyAuthorization method where requests without an Authorization header skip Bearer token validation and fall through to an unconditional return true statement, bypassing all authentication checks. This makes it possible for unauthenticated attackers to access the /wp-json/logtivity/v1/options REST API endpoint and retrieve all plugin configuration options, including the logtivity_site_api_key which can be used to impersonate the site in API calls to the Logtivity service.
Title Activity Logs, User Activity Tracking, Multisite Activity Log from Logtivity <= 3.3.6 - Unauthenticated Information Disclosure via REST API
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-09T12:29:18.271Z

Reserved: 2026-05-08T23:39:09.229Z

Link: CVE-2026-8198

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T13:16:43.687

Modified: 2026-05-09T13:16:43.687

Link: CVE-2026-8198

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T14:00:06Z

Weaknesses