CVE-2024-34798

5.3 MEDIUM

📋 TL;DR

The Debug Log - Manger Tool WordPress plugin versions up to 1.4.5 can write sensitive information like passwords or API keys to log files. This affects WordPress sites using this plugin, potentially exposing credentials to anyone with access to the log files.

💻 Affected Systems

Products:
  • Debug Log - Manger Tool WordPress plugin
Versions: n/a through 1.4.5
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when plugin is active and logging is enabled. WordPress sites on shared hosting are particularly at risk due to potential log file access by other users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to log files containing admin credentials, database passwords, or API keys, leading to complete site compromise, data theft, or unauthorized access to integrated services.

🟠

Likely Case

Unauthorized users with access to log files (like shared hosting users or attackers who breach the server) can extract sensitive credentials and use them for privilege escalation or lateral movement.

🟢

If Mitigated

With proper file permissions and log file protection, the exposed information remains inaccessible to unauthorized users, limiting impact to information disclosure only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to log files, which typically means some level of system access already. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.6 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/debug-log-config-tool/wordpress-debug-log-manger-tool-plugin-1-4-5-sensitive-data-exposure-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'Debug Log - Manger Tool'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.4.6+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable plugin logging

all

Turn off debug logging in plugin settings to prevent sensitive data from being written to logs.

Restrict log file permissions

linux

Set strict file permissions on debug log files to prevent unauthorized access.

chmod 600 /path/to/debug.log
chown www-data:www-data /path/to/debug.log

🧯 If You Can't Patch

  • Disable or remove the Debug Log - Manger Tool plugin entirely.
  • Implement strict access controls on log directories and files to prevent unauthorized reading.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Debug Log - Manger Tool' version. If version is 1.4.5 or lower, you are vulnerable.

Check Version:

wp plugin list --name='debug-log-config-tool' --field=version

Verify Fix Applied:

After update, verify plugin version shows 1.4.6 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Log entries containing sensitive strings like 'password=', 'api_key=', 'secret=', 'token=' in debug log files
  • Unexpected access to debug.log files in web server logs

Network Indicators:

  • HTTP requests attempting to access debug.log or similar log file paths

SIEM Query:

source="web_server" AND (url="*debug.log*" OR url="*.log*") AND response_code=200

🔗 References

📤 Share & Export