WP Activity Log Vulnerability (Medium) – CVE-2026-25331

WP Activity Log Vulnerability (Medium) – CVE-2026-25331

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25331 affects the WP Activity Log plugin (slug: wp-security-audit-log) in versions up to and including 5.5.4. This is a Medium-severity issue (CVSS 6.4, vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).

The vulnerability is an authenticated Stored Cross-Site Scripting (XSS) condition. An attacker needs a valid WordPress account with Contributor-level access or higher to inject malicious script into content or data that is later viewed by other users. Because it is “stored,” the malicious code can execute repeatedly whenever a user visits the affected page or view.

In practical terms, any organization that allows contributors (internal staff, agencies, freelancers, or community authors) is exposed to this risk if they use WP Activity Log 5.5.4 or earlier.

Security Weakness

According to the published advisory, WP Activity Log is vulnerable due to insufficient input sanitization and output escaping. This means untrusted data can be accepted and later rendered in a browser in a way that allows scripts to run under the context of your site.

This matters because browsers will treat the injected script as if it were part of your legitimate website experience. As a result, the attacker’s code can interact with pages and user sessions in ways that can impact accounts, content, and trust.

Reference: CVE-2026-25331 (cve.org)

Technical or Business Impacts

Stored XSS in a logging/auditing plugin can create outsized risk because administrators, editors, and compliance teams may frequently view activity logs and dashboards—potentially triggering the malicious code.

Potential impacts include:

Account and session risk: The injected script may be used to perform actions in a victim’s browser session (for example, changing settings or publishing content) depending on what the victim is authorized to do.

Content integrity and brand damage: Attackers can deface pages, inject unwanted redirects, or add hidden content that harms brand reputation and marketing performance (SEO and conversion rates).

Data exposure and compliance concerns: The CVSS indicates low confidentiality and integrity impact are possible. Even “low” data exposure can be significant if it touches customer information, internal operational details, or regulated data—creating compliance and reporting obligations.

Operational disruption: Investigations, cleanup, and stakeholder communications take time and can interrupt marketing campaigns and normal site operations.

Remediation status: The advisory notes no known patch is available. Based on your risk tolerance, consider mitigations such as limiting Contributor access, tightening role assignments, increasing review/approval workflows, and evaluating whether it is best to uninstall the affected software and replace it.

Similar Attacks

Stored XSS is a common pattern across content management platforms and can have meaningful business impact because it targets everyday site workflows and trusted user sessions.

Example:

WordPress Core Stored XSS (CVE-2015-3440) – NVD

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers