Admin PHP Eval Security & Risk Analysis

wordpress.org/plugins/admin-php-eval

Storing and evaluating PHP scripts within WordPress administration.

10 active installs v1.1 PHP + WP 3.3+ Updated Unknown
adminevalexecutephpscript
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Admin PHP Eval Safe to Use in 2026?

Generally Safe

Score 100/100

Admin PHP Eval has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'admin-php-eval' plugin v1.1 exhibits a mixed security posture. On the positive side, it has no known CVEs, a clean vulnerability history, and a strong adherence to prepared statements for SQL queries, proper output escaping for the vast majority of outputs, and a good number of nonce checks. It also lacks external HTTP requests and file operations, which are common sources of vulnerabilities.

However, the static analysis reveals significant concerns. The presence of the `create_function` dangerous function is a critical red flag, as it can be exploited for code injection if user input is improperly handled. Furthermore, the taint analysis indicates three flows with unsanitized paths, one of which is classified as critical severity. This suggests a potential for attackers to inject malicious code or commands through certain inputs, despite the lack of direct entry points like AJAX handlers or REST API routes. The complete absence of capability checks is also a notable weakness, meaning that even if an attacker manages to leverage an input flow, there are no WordPress user role checks to prevent them from performing administrative actions.

While the plugin's vulnerability history is clean, this might be due to its limited attack surface or simply a lack of public discovery. The critical taint flow and the dangerous function are serious indicators of potential vulnerabilities that warrant immediate attention. The plugin's strengths lie in its good practices for database and output handling, but these are overshadowed by the critical code execution risk.

Key Concerns

  • Critical severity taint flow found
  • Unsanitized paths in taint flows
  • Use of dangerous function create_function
  • No capability checks on entry points
Vulnerabilities
None known

Admin PHP Eval Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Admin PHP Eval Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
29 escaped
Nonce Checks
5
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$cmp = create_function( '$a,$b',admin-php-eval.php:309

Output Escaping

94% escaped31 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

4 flows3 with unsanitized paths
page (admin-php-eval.php:50)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Admin PHP Eval Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitadmin-php-eval.php:27
actionadmin_menuadmin-php-eval.php:28
Maintenance & Trust

Admin PHP Eval Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Admin PHP Eval Developer Profile

Jan Štětina

8 plugins · 200 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Admin PHP Eval

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Admin PHP Eval