Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2019-25315

CVE-2019-25315: WordPress Server Log Viewer XSS Flaw

CVE-2019-25315 is a persistent cross-site scripting vulnerability in WordPress Server Log Viewer 1.0 allowing attackers to inject malicious scripts via log file paths. This article covers technical details, impact, and mitigation.

Published: February 13, 2026

CVE-2019-25315 Overview

CVE-2019-25315 is a persistent cross-site scripting (XSS) vulnerability affecting WordPress Server Log Viewer version 1.0. The plugin fails to properly sanitize log file paths, allowing attackers to inject malicious scripts that execute when administrators view logs through the WordPress admin interface. This stored XSS vulnerability enables attackers to execute arbitrary JavaScript code in the context of authenticated administrator sessions.

Critical Impact

Attackers can inject persistent malicious scripts through log file paths, potentially leading to session hijacking, privilege escalation, or complete WordPress site compromise when administrators access the log viewer functionality.

Affected Products

  • WordPress Server Log Viewer 1.0
  • WordPress installations with the vulnerable plugin active

Discovery Timeline

  • 2026-02-11 - CVE CVE-2019-25315 published to NVD
  • 2026-02-11 - Last updated in NVD database

Technical Details for CVE-2019-25315

Vulnerability Analysis

This vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation), commonly known as Cross-Site Scripting. The WordPress Server Log Viewer plugin processes log file paths without adequate input validation or output encoding, creating an opportunity for persistent script injection.

When an attacker adds a log file with a specially crafted path containing XSS payloads, the malicious content becomes stored within the plugin's configuration. Subsequently, when any WordPress administrator navigates to the log viewer interface, the unescaped payload executes within their authenticated browser session. This attack vector requires low privileges for initial injection but achieves high impact through its persistent nature and targeting of privileged users.

Root Cause

The root cause of this vulnerability lies in insufficient input sanitization of the log file path parameter. The plugin accepts user-supplied file paths without properly encoding or validating them before rendering in the WordPress admin panel. This allows HTML and JavaScript content embedded in the path string to be interpreted as executable code rather than plain text when displayed.

Attack Vector

The attack leverages the network-accessible WordPress admin interface. An attacker with low-level WordPress privileges can configure a log file path containing embedded JavaScript. The malicious payload persists in the plugin settings and activates whenever an administrator accesses the log viewer, requiring no further attacker interaction. The attack requires user interaction (an admin must view the affected page) but once triggered, can perform actions with the administrator's session privileges.

The vulnerability can be exploited by crafting log file paths that include script tags or JavaScript event handlers. For detailed technical information regarding exploitation techniques, refer to the Exploit-DB #47419 entry and the VulnCheck Advisory.

Detection Methods for CVE-2019-25315

Indicators of Compromise

  • Presence of script tags or JavaScript event handlers in log viewer plugin configuration settings
  • Unexpected log file paths containing HTML special characters or encoded payloads in the wp_options database table
  • Browser console errors or unexpected script execution when accessing the Server Log Viewer admin page

Detection Strategies

  • Review the WordPress Server Log Viewer plugin settings for suspicious or malformed log file paths
  • Audit the wp_options table for entries containing XSS payload patterns associated with the log viewer plugin
  • Monitor browser network activity for unexpected outbound requests when administrators access the log viewer
  • Implement Content Security Policy (CSP) headers to detect and block inline script execution

Monitoring Recommendations

  • Enable WordPress audit logging to track changes to plugin settings and configurations
  • Configure Web Application Firewall (WAF) rules to alert on XSS payload patterns in POST requests to WordPress admin endpoints
  • Regularly review admin user activity logs for unusual access patterns to the log viewer functionality

How to Mitigate CVE-2019-25315

Immediate Actions Required

  • Disable or uninstall the WordPress Server Log Viewer plugin version 1.0 until a patched version is available
  • Audit existing plugin configuration for any suspicious log file paths and remove them
  • Review administrator sessions and reset credentials if compromise is suspected
  • Implement Content Security Policy headers to mitigate the impact of XSS attacks

Patch Information

Users should check the GitHub WP Server Log Viewer repository for any security updates or patched versions. Given the age of this vulnerability and the plugin's maintenance status, consider migrating to an actively maintained alternative log viewer plugin with proper security practices.

Workarounds

  • Remove the WordPress Server Log Viewer plugin entirely and use alternative server-side log viewing methods
  • Restrict access to the plugin's admin pages to only highly trusted administrator accounts
  • Implement a Web Application Firewall (WAF) with XSS protection rules targeting the WordPress admin interface
  • Apply manual input sanitization by reviewing and clearing any stored log file path configurations before use
bash
# Disable the vulnerable plugin via WP-CLI
wp plugin deactivate wp-server-log-viewer --path=/var/www/html/wordpress

# Check for suspicious entries in wp_options
wp db query "SELECT * FROM wp_options WHERE option_name LIKE '%log_viewer%'" --path=/var/www/html/wordpress

# Optional: Remove the plugin entirely
wp plugin delete wp-server-log-viewer --path=/var/www/html/wordpress

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechWordpress

  • SeverityMEDIUM

  • CVSS Score5.1

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-79
  • Technical References
  • GitHub WP Server Log Viewer

  • Exploit-DB #47419

  • VulnCheck Advisory - XSS in WP Server Log Viewer
  • Related CVEs
  • CVE-2026-4512: reCaptcha by WebDesignBy XSS Vulnerability

  • CVE-2025-32630: WP-BusinessDirectory XSS Vulnerability

  • CVE-2025-32581: WordPress Spam Blocker XSS Vulnerability

  • CVE-2025-28975: Alike WordPress Plugin XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English