Security for everyone

CVE-2017-18562 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in Error Log Viewer plugin for WordPress affects v. before 1.0.6.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



The Error Log Viewer plugin is a useful tool for WordPress users to easily view and manage their website's error logs. It is designed to help website administrators stay on top of issues that might arise with their site and troubleshoot problems quickly. This plugin is especially useful for users who have installed a lot of third-party plugins and are running complex websites with a lot of moving parts.

One particular vulnerability that has been detected in this plugin is CVE-2017-18562. This vulnerability is caused by a lack of sanitization in the user input. Malicious actors can exploit this vulnerability by injecting malicious code into the error log, which can then execute on the website. This can lead to unauthorized access to sensitive data or complete takeover of the website.

If exploited, this vulnerability can have serious consequences for both website owners and their users. It can lead to the theft of sensitive data, including login credentials and payment information, as well as the injection of malicious code that can harm the website's visitors. The vulnerability also presents an opportunity for attackers to gain unauthorized access to website resources and potentially take over the website completely.

Thanks to the pro features of the platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. The platform provides users with valuable insights into their website's security posture, including identifying vulnerabilities and recommending remediation steps. By taking advantage of these features, website owners can stay one step ahead of potential attackers and keep their assets secure.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture