CVE-2024-11085

5.4 MEDIUM

📋 TL;DR

The WP Log Viewer WordPress plugin has missing capability checks on AJAX endpoints, allowing authenticated users with Subscriber-level access or higher to view logs and modify plugin settings. This affects all WordPress sites running plugin versions up to 1.2.1. Attackers need at least a subscriber account to exploit this vulnerability.

💻 Affected Systems

Products:
  • WP Log Viewer WordPress Plugin
Versions: All versions up to and including 1.2.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with WP Log Viewer plugin installed. Any authenticated user (Subscriber role or higher) can exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could view sensitive log data containing user information, system details, or debugging information, then modify plugin settings to disrupt functionality or enable further attacks.

🟠

Likely Case

Low-privilege users accessing logs they shouldn't see, potentially exposing administrative actions, error details, or user activity that should be restricted.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to unauthorized log viewing by authenticated users who already have some site access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending crafted AJAX requests to vulnerable endpoints. No special tools needed beyond web browser or curl.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/wp-log-viewer/trunk/libs/Ajax.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find WP Log Viewer. 4. Click 'Update Now' if update available. 5. If no update shows, manually download version 1.2.2+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable WP Log Viewer Plugin

all

Temporarily deactivate the vulnerable plugin until patched

wp plugin deactivate wp-log-viewer

Restrict User Registration

all

Disable new user registration to prevent attackers creating subscriber accounts

Update WordPress Settings → General → Membership: Uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Remove WP Log Viewer plugin completely from production sites
  • Implement web application firewall rules to block suspicious AJAX requests to wp-log-viewer endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WP Log Viewer version. If version is 1.2.1 or lower, you are vulnerable.

Check Version:

wp plugin get wp-log-viewer --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.2.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to /wp-admin/admin-ajax.php with action parameters containing 'wp_log_viewer'
  • Subscriber-level users accessing log-related endpoints
  • Failed capability checks in WordPress debug logs

Network Indicators:

  • POST requests to admin-ajax.php with wp_log_viewer actions from non-admin users
  • Unexpected log export or download requests

SIEM Query:

source="wordpress.log" AND ("admin-ajax.php" AND "wp_log_viewer") AND NOT user_role="administrator"

🔗 References

📤 Share & Export