AP HoneyPot WordPress Plugin Security & Risk Analysis

wordpress.org/plugins/ap-honeypot

AP HoneyPot WordPress Plugin allows you to verify IP addresses of clients connecting to your blog against the Project Honey Pot database.

100 active installs v1.4 PHP + WP 2.9+ Updated Dec 4, 2013
commentshoneypothttpblspam
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 5, 2025
Safety Verdict

Is AP HoneyPot WordPress Plugin Safe to Use in 2026?

Use With Caution

Score 63/100

AP HoneyPot WordPress Plugin has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 5, 2025Updated 12yr ago
Risk Assessment

The 'ap-honeypot' plugin version 1.4 exhibits a mixed security posture. On one hand, it demonstrates good practices by having a zero attack surface regarding AJAX handlers, REST API routes, shortcodes, and cron events, meaning there are no direct entry points for attackers to exploit through these common vectors without authentication. The absence of file operations and external HTTP requests also reduces potential risks. However, significant concerns arise from the code analysis. With only 14% of outputs properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. The fact that 4 out of 4 analyzed taint flows have unsanitized paths, with one deemed high severity, points to critical vulnerabilities that could allow attackers to inject malicious code or data. Furthermore, the presence of raw SQL queries without prepared statements in 56% of cases increases the risk of SQL injection. The plugin's vulnerability history, including a medium severity Cross-Site Request Forgery (CSRF) vulnerability in the past and one currently unpatched CVE, indicates a pattern of security weaknesses that have not been fully addressed, suggesting potential recurring issues. While the plugin lacks a large attack surface and avoids certain risky functionalities, the high rate of unescaped output, unsanitized taint flows, and a history of vulnerabilities necessitate careful consideration before deployment.

Key Concerns

  • Unpatched CVE
  • High severity unsanitized taint flow
  • Low proper output escaping
  • Raw SQL queries without prepared statements
  • Medium severity vulnerability history (CSRF)
Vulnerabilities
1

AP HoneyPot WordPress Plugin Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58855medium · 4.3Cross-Site Request Forgery (CSRF)

AP HoneyPot WordPress Plugin <= 1.4 - Cross-Site Request Forgery

Sep 5, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

AP HoneyPot WordPress Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
4 prepared
Unescaped Output
30
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

44% prepared9 total queries

Output Escaping

14% escaped35 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
dashboard_log_configure (ap-honeypot.class.php:131)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AP HoneyPot WordPress Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitap-honeypot.class.php:98
actioninitap-honeypot.class.php:99
actionwp_footerap-honeypot.class.php:100
actioninitap-honeypot.class.php:101
actionadmin_menuap-honeypot.class.php:102
filterplugin_action_linksap-honeypot.class.php:103
actionwp_dashboard_setupap-honeypot.class.php:107
actionadmin_noticesap-honeypot.class.php:111
Maintenance & Trust

AP HoneyPot WordPress Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 4, 2013
PHP min version
Downloads7K

Community Trust

Rating94/100
Number of ratings3
Active installs100
Developer Profile

AP HoneyPot WordPress Plugin Developer Profile

Denis V (Artprima)

3 plugins · 140 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AP HoneyPot WordPress Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ap-honeypot/ap-honeypot.css/wp-content/plugins/ap-honeypot/ap-honeypot.js
Script Paths
/wp-content/plugins/ap-honeypot/ap-honeypot.js
Version Parameters
ap-honeypot.css?ver=ap-honeypot.js?ver=

HTML / DOM Fingerprints

CSS Classes
ap-honeypot-nag
HTML Comments
TODO: * Use nonce in settings * Rewrite AP_HoneyPot::check_log_table() to work more effectively * Better WordPress MU support consts vars Counting from the day of visit.+2 more
Data Attributes
id="ap-honeypot-nag"name="widget-ap-honeypot-log-entries[items]"id="log-entries-number"
JS Globals
APHP_PLUGIN_SETTINGS_URL
FAQ

Frequently Asked Questions about AP HoneyPot WordPress Plugin