Apermo Xdebug Security & Risk Analysis

wordpress.org/plugins/apermo-xdebug

This plugin helps developers that use Xdebug.

10 active installs v1.2.2 PHP + WP 4.6.0+ Updated Jun 21, 2018
admindebugdebuggingdeveloperdevelopment
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Apermo Xdebug Safe to Use in 2026?

Generally Safe

Score 85/100

Apermo Xdebug has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'apermo-xdebug' plugin v1.2.2 exhibits an excellent security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface entries, such as AJAX handlers, REST API routes, shortcodes, or cron events, significantly limits the potential for external manipulation or unauthorized access. Furthermore, the code signals reveal a clean codebase with no dangerous functions, no file operations, and no external HTTP requests. The use of prepared statements for all SQL queries is a strong indicator of secure database interaction, and the complete lack of taint analysis findings suggests that data flows are being handled safely within the plugin.

The plugin's vulnerability history is equally reassuring, with zero recorded CVEs, meaning there are no known public vulnerabilities associated with this version. This suggests a proactive approach to security by the developers or a lack of targeted attacks. The plugin demonstrates good practices by not bundling external libraries, further reducing the risk of introducing vulnerabilities through outdated or insecure third-party code.

Overall, the 'apermo-xdebug' v1.2.2 plugin appears to be a highly secure component. The only minor area for consideration is the output escaping, which is not fully comprehensive (57% properly escaped). While no specific vulnerabilities arise from this in the current analysis, it represents a potential, albeit small, risk that could be mitigated by achieving 100% proper escaping.

Key Concerns

  • Output escaping not fully comprehensive
Vulnerabilities
None known

Apermo Xdebug Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Apermo Xdebug Release Timeline

v1.2.2Current
v1.2.1
v1.2.0
v1.1.0
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 17, 2026

Apermo Xdebug Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped7 total outputs
Attack Surface

Apermo Xdebug Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_noticesapermo-xdebug.php:49
actionadmin_noticesapermo-xdebug.php:60
actionadmin_headapermo-xdebug.php:86
actionadmin_headapermo-xdebug.php:87
actionplugins_loadedapermo-xdebug.php:206
Maintenance & Trust

Apermo Xdebug Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJun 21, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Apermo Xdebug Developer Profile

Christoph Daum

4 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Apermo Xdebug

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/apermo-xdebug/apermo-xdebug.php

HTML / DOM Fingerprints

CSS Classes
apermo-xdebug-link
JS Globals
apermo_xdebug_search_urls
FAQ

Frequently Asked Questions about Apermo Xdebug