WP Activity Log Vulnerability (Medium) – CVE-2026-25331

WP Activity Log Vulnerability (Medium) – CVE-2026-25331

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25331 affects the WP Activity Log plugin (slug: wp-security-audit-log) in versions up to and including 5.5.4. This is a Medium severity issue (CVSS 6.4) where an attacker must already have a WordPress login with contributor-level access or higher.

In practical terms, the risk is highest for organizations running multi-author sites (marketing teams, agencies, franchises, or sites with many guest contributors). If an attacker compromises a lower-privilege account (or a legitimate user turns malicious), they may be able to place a harmful script that runs when other users—potentially including administrators—view the affected page(s) in the WordPress environment.

Security Weakness

This vulnerability is a Stored Cross-Site Scripting (Stored XSS) condition caused by insufficient input sanitization and output escaping in the Activity Log plugin versions up to 5.5.4. Stored XSS is especially concerning because the injected content is saved and can execute repeatedly for any user who loads the impacted page.

Additional reference details: CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N. Official CVE record: https://www.cve.org/CVERecord?id=CVE-2026-25331. Public advisory source: Wordfence vulnerability entry.

Technical or Business Impacts

While this is not classified as a “critical” vulnerability, Stored XSS can still create meaningful business risk because it can enable actions in the context of a trusted user’s browser session. Depending on who views the injected content, impacts may include unauthorized changes to site content, insertion of spam links, or actions performed as a logged-in user.

For marketing, executive, and compliance stakeholders, the most common business impacts include:

  • Brand and customer trust damage if visitors or staff encounter unexpected pop-ups, redirects, or injected content.
  • Campaign integrity issues (e.g., altered landing pages, injected outbound links, or interference with tracking/measurement workflows) that can distort performance reporting.
  • Data exposure risk if scripts are used to capture information displayed in the browser or to tamper with forms and on-page interactions.
  • Compliance and audit concerns due to unauthorized content changes or potential exposure of sensitive information, leading to incident response costs and reporting obligations.

Remediation: Update WP Activity Log to version 5.6.0 or newer (patched). Consider also reviewing who has contributor access, enforcing strong authentication, and monitoring for unexpected content or admin activity following the update.

Similar Attacks

Stored XSS has been used in real-world incidents to spread quickly and impact brand reputation by executing scripts in a trusted context. Examples include the “Samy” MySpace worm, which leveraged XSS to propagate across user profiles.

Another related example of malicious script injection affecting business outcomes is the Magecart class of attacks, where injected JavaScript was used to steal data from high-traffic websites—highlighting how browser-executed scripts can create outsized financial, legal, and reputational impact.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers