Activity Log for WordPress Vulnerability (Medium) – CVE-2026-1671

Activity Log for WordPress Vulnerability (Medium) – CVE-2026-1671

by | Feb 12, 2026 | Plugins

Attack Vectors

Activity Log for WordPress (slug: winterlock) versions 1.2.8 and earlier have a Medium-severity vulnerability (CVE-2026-1671, CVSS 6.5) that can be abused by an attacker who already has a basic, legitimate login (for example, a Subscriber account).

Because this is a network-reachable issue with low complexity and no user interaction required (CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N), the most realistic attack scenario is a compromised low-level account (via password reuse, phishing, or credential stuffing) being used to access the plugin’s log data.

Security Weakness

The plugin is vulnerable to unauthorized access to sensitive information due to a missing permission (capability) check in the winter_activity_log_action() function, affecting all versions up to and including 1.2.8.

As reported, this weakness can allow authenticated users with Subscriber-level access and above to view potentially sensitive information contained in the exposed log files—potentially including credentials such as the password of a higher-privileged user (e.g., an administrator), if that data appears in logs.

Reference: CVE-2026-1671 record and the published advisory source at Wordfence Threat Intelligence.

Technical or Business Impacts

Confidentiality risk is high for this issue (CVSS indicates high impact to confidentiality). If logs expose sensitive details, a low-privilege account could become a stepping stone to broader access—potentially escalating to administrator-level control if credentials are obtained from log content.

For marketing directors and executives, the business implications can include site takeover risk, leakage of customer or internal operational data, brand damage, and compliance exposure if regulated or personal data is revealed through logs. Even when the data is “just logs,” it can contain business-critical context (accounts, actions, system events) that supports further compromise.

Recommended action: update Activity Log for WordPress to version 1.2.9 or a newer patched version. In parallel, review who has WordPress accounts (especially Subscriber-level users), reduce unnecessary accounts, and ensure credentials are rotated if there is any concern that sensitive log content may have been accessed.

Similar Attacks

While the mechanics differ case by case, security incidents often hinge on unintended access to sensitive data or systems due to control gaps. Examples of real-world breaches with major business impact include:

Capital One (2019) — a high-profile exposure event that led to significant regulatory scrutiny and reputational damage.

Marriott/Starwood (ICO enforcement) — illustrates how large-scale data exposure can trigger compliance actions and long-tail business costs.

LastPass (2022 incident notice) — shows how downstream impacts can persist when sensitive information is accessed.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers