Backlog Ticket Viewer Security & Risk Analysis

wordpress.org/plugins/backlog-ticket-viewer

Display Backlog ticket on the dashboard.

0 active installs v1.0 PHP 7.1+ WP 4.9+ Updated Jan 21, 2019
backlogdashboardwordpress-dashboard
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Backlog Ticket Viewer Safe to Use in 2026?

Generally Safe

Score 85/100

Backlog Ticket Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The backlog-ticket-viewer plugin v1.0 presents a seemingly strong security posture based on the provided static analysis. The absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate good practices such as using prepared statements for all SQL queries, a relatively high percentage of output escaping, and the presence of nonce and capability checks. The lack of any recorded vulnerabilities in its history is also a positive indicator.

However, a complete lack of taint analysis flows and the presence of external HTTP requests without further context warrant cautious consideration. While no critical or high-severity issues were flagged, 16% of outputs are not properly escaped, which could lead to potential cross-site scripting (XSS) vulnerabilities if the data being output is user-controlled and not adequately sanitized before reaching the escaping function. The external HTTP requests also represent a potential vector for attacks if the plugin doesn't properly validate or sanitize data before sending it to external services, or if those services themselves are compromised. These areas, while not flagged as critical, represent opportunities for attackers to exploit if not handled with extreme care.

In conclusion, the plugin demonstrates a good foundation of security practices, particularly in its limited attack surface and SQL handling. The primary areas of concern are the unescaped outputs and the external HTTP requests, which require further scrutiny to ensure no vulnerabilities are present. The clean vulnerability history is encouraging, but ongoing vigilance is always recommended for any plugin.

Key Concerns

  • Unescaped output found
  • External HTTP requests present
Vulnerabilities
None known

Backlog Ticket Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Backlog Ticket Viewer Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Backlog Ticket Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
23
61 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
4
Bundled Libraries
0

Output Escaping

73% escaped84 total outputs
Attack Surface

Backlog Ticket Viewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_enqueue_scriptsbacklog-ticket-viewer.php:24
actionwp_dashboard_setupbacklog-ticket-viewer.php:25
actionadmin_initbacklog-ticket-viewer.php:26
Maintenance & Trust

Backlog Ticket Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 21, 2019
PHP min version7.1
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Backlog Ticket Viewer Developer Profile

PRESSMAN

24 plugins · 130 total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Backlog Ticket Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/backlog-ticket-viewer/css/style.css

HTML / DOM Fingerprints

CSS Classes
btv_no_settingsbtv_infobtv_pjtnamebtv_listfilterbtv_listbtv_idbtv_titlebtv_assign+2 more
REST Endpoints
/api/v2/projects//api/v2/issues
FAQ

Frequently Asked Questions about Backlog Ticket Viewer