CVE-2025-67561

5.4 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Debug Log Viewer WordPress plugin that allows unauthorized users to access debug logs. Attackers can exploit incorrectly configured access controls to view sensitive debugging information. This affects all WordPress sites running Debug Log Viewer version 2.0.3 and earlier.

💻 Affected Systems

Products:
  • Debug Log Viewer WordPress Plugin
Versions: <= 2.0.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Debug Log Viewer plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users gain access to sensitive debug logs containing system information, configuration details, and potentially credentials or other sensitive data.

🟠

Likely Case

Attackers access debug logs containing application errors, configuration details, and potentially partial sensitive data that could aid further attacks.

🟢

If Mitigated

Proper access controls prevent unauthorized viewing, limiting debug log access to authorized administrators only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires direct access to the vulnerable endpoint without proper authentication checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.0.3

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/debug-log-viewer/vulnerability/wordpress-debug-log-viewer-plugin-2-0-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Debug Log Viewer. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable Debug Log Viewer Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate debug-log-viewer

Restrict Access via .htaccess

linux

Block access to debug log viewer endpoints

# Add to .htaccess in WordPress root:
<FilesMatch "debug-log-viewer">
Order Deny,Allow
Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove debug-log-viewer plugin completely from WordPress installation
  • Implement web application firewall rules to block access to debug-log-viewer endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Debug Log Viewer version <= 2.0.3

Check Version:

wp plugin get debug-log-viewer --field=version

Verify Fix Applied:

Verify Debug Log Viewer plugin version is > 2.0.3 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/debug-log-viewer/ endpoints
  • HTTP 200 responses to debug log viewer URLs from unauthenticated IPs

Network Indicators:

  • GET requests to debug-log-viewer endpoints without authentication headers
  • Traffic to /wp-content/plugins/debug-log-viewer/ from external IPs

SIEM Query:

source="web_server" AND (url="*debug-log-viewer*" OR url="*debug_log_viewer*") AND status=200 AND NOT user_agent="*bot*"

🔗 References

📤 Share & Export