Error Log Viewer by BestWebSoft Security & Risk Analysis

wordpress.org/plugins/error-log-viewer

Get latest error log messages to diagnose website problems. Define and fix issues faster.

6K active installs v1.1.8 PHP + WP 6.2+ Updated Dec 3, 2025
add-debug-tooldebug-toolerror-logerror-log-viewerphp-error-log
94
A · Safe
CVEs total5
Unpatched0
Last CVEOct 10, 2025
Safety Verdict

Is Error Log Viewer by BestWebSoft Safe to Use in 2026?

Generally Safe

Score 94/100

Error Log Viewer by BestWebSoft has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

5 known CVEsLast CVE: Oct 10, 2025Updated 5mo ago
Risk Assessment

The error-log-viewer plugin v1.1.8 exhibits a mixed security posture. On the positive side, static analysis indicates good practices in output escaping (96%) and a significant number of nonce and capability checks (26 and 3 respectively). The absence of unprotected AJAX handlers, REST API routes, and shortcodes is also commendable, limiting the direct attack surface. Taint analysis shows no critical or high-severity issues, suggesting that input sanitization for identified flows is generally effective.

However, concerns arise from the plugin's vulnerability history. The presence of 5 known CVEs, including one high-severity vulnerability and four medium-severity ones, indicates a recurring pattern of security weaknesses. The types of past vulnerabilities (Path Traversal, Information Exposure, CSRF, External File Control, XSS) point to a need for more robust input validation and output encoding, especially for user-supplied data that might interact with file paths or be displayed in logs. While there are currently no unpatched CVEs, the historical trend suggests a potential for future vulnerabilities if these underlying issues are not thoroughly addressed in the codebase.

In conclusion, while the current version shows some strengths in secure coding practices like output escaping and authentication checks, the past vulnerability record is a significant red flag. Developers should prioritize a thorough review of code that handles file operations and user-generated content to prevent recurrence of path traversal, information exposure, and XSS vulnerabilities. The plugin's history suggests a need for more comprehensive security auditing and potentially a more rigorous development process to ensure ongoing security.

Key Concerns

  • History of 1 high severity vulnerability
  • History of 4 medium severity vulnerabilities
  • 2 flows with unsanitized paths (taint analysis)
  • 50% of SQL queries not using prepared statements
  • File operations present
  • External HTTP requests present
Vulnerabilities
5 published

Error Log Viewer by BestWebSoft Security Vulnerabilities

CVEs by Year

1 CVE in 2017
2017
2 CVEs in 2021
2021
1 CVE in 2024
2024
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1
Medium
4

5 total CVEs

CVE-2025-9950medium · 4.9Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Error Log Viewer by BestWebSoft <= 1.1.6 - Authenticated (Administrator+) Arbitrary File Read

Oct 10, 2025 Patched in 1.1.7 (4d)
CVE-2023-6821medium · 5.3Exposure of Sensitive Information to an Unauthorized Actor

Error Log Viewer <= 1.1.2 - Sensitive Information Exposure

Feb 20, 2024 Patched in 1.1.3 (8d)
CVE-2021-24761high · 8.8Cross-Site Request Forgery (CSRF)

Error Log Viewer by BestWebSoft <= 1.1.1 - Cross-Site Request Forgery

Dec 29, 2021 Patched in 1.1.2 (755d)
CVE-2021-24966medium · 5.5External Control of File Name or Path

Error Log Viewer <= 1.1.1 - Arbitrary File Deletion

Nov 10, 2021 Patched in 1.1.2 (804d)
CVE-2017-18562medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Error Log Viewer by BestWebSoft < 1.0.6 - Reflected Cross-Site Scripting

Apr 17, 2017 Patched in 1.0.6 (2472d)
Version History

Error Log Viewer by BestWebSoft Release Timeline

Code Analysis
Analyzed Mar 16, 2026

Error Log Viewer by BestWebSoft Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
22
576 escaped
Nonce Checks
26
Capability Checks
3
File Operations
8
External Requests
6
Bundled Libraries
0

SQL Query Safety

50% prepared4 total queries

Output Escaping

96% escaped598 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

9 flows2 with unsanitized paths
rrrlgvwr_init (error-log-viewer.php:66)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Error Log Viewer by BestWebSoft Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 2

authwp_ajax_bws_submit_request_feature_actionbws_menu\class-bws-settings.php:1466
authwp_ajax_bws_submit_uninstall_reason_actionbws_menu\deactivation-form.php:433
WordPress Hooks 19
filterload_textdomain_mofilebws_menu\bws_functions.php:43
filtermce_external_pluginsbws_menu\bws_functions.php:1146
filtermce_buttonsbws_menu\bws_functions.php:1147
actionadmin_initbws_menu\bws_functions.php:1433
actionadmin_enqueue_scriptsbws_menu\bws_functions.php:1434
actionadmin_headbws_menu\bws_functions.php:1435
actionadmin_footerbws_menu\bws_functions.php:1436
actionadmin_noticesbws_menu\bws_functions.php:1438
actionwp_enqueue_scriptsbws_menu\bws_functions.php:1440
actionadmin_menuerror-log-viewer.php:1453
actioniniterror-log-viewer.php:1454
actionadmin_initerror-log-viewer.php:1455
actionplugins_loadederror-log-viewer.php:1457
actionadmin_enqueue_scriptserror-log-viewer.php:1459
filterplugin_action_linkserror-log-viewer.php:1461
filterplugin_row_metaerror-log-viewer.php:1463
actionadmin_noticeserror-log-viewer.php:1465
actionrrrlgvwr_shedule_eventerror-log-viewer.php:1467
filtercron_scheduleserror-log-viewer.php:1469

Scheduled Events 1

rrrlgvwr_shedule_event
Maintenance & Trust

Error Log Viewer by BestWebSoft Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 3, 2025
PHP min version
Downloads95K

Community Trust

Rating96/100
Number of ratings9
Active installs6K
Developer Profile

Error Log Viewer by BestWebSoft Developer Profile

bestwebsoft

18 plugins · 207K total installs

76
trust score
Avg Security Score
96/100
Avg Patch Time
1695 days
View full developer profile
Detection Fingerprints

How We Detect Error Log Viewer by BestWebSoft

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/error-log-viewer/css/error-log-viewer.css/wp-content/plugins/error-log-viewer/js/error-log-viewer.js/wp-content/plugins/error-log-viewer/js/bws-captcha.js/wp-content/plugins/error-log-viewer/js/bws-ajax.js
Version Parameters
error-log-viewer/css/error-log-viewer.css?ver=error-log-viewer/js/error-log-viewer.js?ver=error-log-viewer/js/bws-captcha.js?ver=error-log-viewer/js/bws-ajax.js?ver=

HTML / DOM Fingerprints

CSS Classes
rrrlgvwr_settings_page
HTML Comments
<!--Copyright 2021 BestWebSoft ( https://support.bestwebsoft.com )--><!--Get latest error log messages to diagnose website problems. Define and fix issues faster.-->
Data Attributes
data-rrrlgvwr-action
JS Globals
var rrrlgvwr_ajax_object
FAQ

Frequently Asked Questions about Error Log Viewer by BestWebSoft