An unauthenticated remote attacker could force all authenticated users, such as administrative users, to perform unauthorized actions by viewing the logs. This action would also grant the attacker privilege escalation.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03