
Admin PHP Eval Security & Risk Analysis
wordpress.org/plugins/admin-php-evalStoring and evaluating PHP scripts within WordPress administration.
Is Admin PHP Eval Safe to Use in 2026?
Generally Safe
Score 100/100Admin PHP Eval has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'admin-php-eval' plugin v1.1 exhibits a mixed security posture. On the positive side, it has no known CVEs, a clean vulnerability history, and a strong adherence to prepared statements for SQL queries, proper output escaping for the vast majority of outputs, and a good number of nonce checks. It also lacks external HTTP requests and file operations, which are common sources of vulnerabilities.
However, the static analysis reveals significant concerns. The presence of the `create_function` dangerous function is a critical red flag, as it can be exploited for code injection if user input is improperly handled. Furthermore, the taint analysis indicates three flows with unsanitized paths, one of which is classified as critical severity. This suggests a potential for attackers to inject malicious code or commands through certain inputs, despite the lack of direct entry points like AJAX handlers or REST API routes. The complete absence of capability checks is also a notable weakness, meaning that even if an attacker manages to leverage an input flow, there are no WordPress user role checks to prevent them from performing administrative actions.
While the plugin's vulnerability history is clean, this might be due to its limited attack surface or simply a lack of public discovery. The critical taint flow and the dangerous function are serious indicators of potential vulnerabilities that warrant immediate attention. The plugin's strengths lie in its good practices for database and output handling, but these are overshadowed by the critical code execution risk.
Key Concerns
- Critical severity taint flow found
- Unsanitized paths in taint flows
- Use of dangerous function create_function
- No capability checks on entry points
Admin PHP Eval Security Vulnerabilities
Admin PHP Eval Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Admin PHP Eval Attack Surface
WordPress Hooks 2
Maintenance & Trust
Admin PHP Eval Maintenance & Trust
Maintenance Signals
Community Trust
Admin PHP Eval Alternatives
Admin Ajax dot php? No Thank You!
admin-ajax-php-no-thank-you
Changes the wp-admin/admin-ajax.php endpoint to /ajax/
Byte's PHP Code Widget
byte-php-code
Mix HTML and PHP in a widget with mobile support.
DX Template Manager
dx-template-manager
Create page templates like the ones in your theme folder but through a "DX Templates" menu in your Admin dashboard - HTML, JS, PHP supported …
LH Javascript Error log
lh-javascript-error-log
Log Javascript errors from your browser to your wordpress error log.
Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts
insert-php
Insert PHP, JavaScript, CSS, HTML, ads, and tracking code into WordPress headers, footers, pages, and content using conditional logic, without editing …
Admin PHP Eval Developer Profile
8 plugins · 200 total installs
How We Detect Admin PHP Eval
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.