Better Uptime Security & Risk Analysis

wordpress.org/plugins/better-uptime

Better Uptime is a radically better infrastructure monitoring platform that calls the right person on your team if anything goes wrong.

20 active installs v1.0.3 PHP 5.6+ WP 4.0+ Updated Feb 4, 2021
incident-managementstatus-pagesuptimeuptime-monitoringwebsite-monitoring
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Better Uptime Safe to Use in 2026?

Generally Safe

Score 85/100

Better Uptime has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "better-uptime" v1.0.3 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and avoids dangerous functions, file operations, and external HTTP requests. The taint analysis also shows no critical or high-severity vulnerabilities, indicating no apparent paths for unsanitized data to lead to exploitation.

However, a notable concern arises from the output escaping. With 2 total outputs and 0% properly escaped, there is a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data rendered on the frontend without proper sanitization poses a significant risk. While the plugin has no recorded vulnerability history, this should not be interpreted as immunity, especially given the identified output escaping issue. The lack of capability and nonce checks also contributes to potential weaknesses if new entry points were to be introduced in future versions.

In conclusion, "better-uptime" v1.0.3 is strong in its minimal attack surface and secure data handling for SQL. The critical weakness lies in its output escaping, which demands immediate attention to prevent XSS attacks. The absence of past vulnerabilities is positive, but the current code analysis highlights a specific, addressable risk.

Key Concerns

  • Output is not properly escaped
Vulnerabilities
None known

Better Uptime Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Better Uptime Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Better Uptime Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menubetter-uptime.php:21
Maintenance & Trust

Better Uptime Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedFeb 4, 2021
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Better Uptime Developer Profile

simonbetteruptime

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Better Uptime

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
dashicons-external
Data Attributes
data-url="https://betteruptime.com/"
FAQ

Frequently Asked Questions about Better Uptime