Blog Voyeur Security & Risk Analysis

wordpress.org/plugins/blog-voyeur

Log by name where and when users visit your blog.

10 active installs v0.2 PHP + WP + Updated Dec 23, 2007
logprivacystatsuser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blog Voyeur Safe to Use in 2026?

Generally Safe

Score 85/100

Blog Voyeur has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 18yr ago
Risk Assessment

The "blog-voyeur" plugin v0.2 exhibits a mixed security posture. On the positive side, it has a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of known vulnerabilities in its history is a strong indicator of good past development practices and a potentially stable codebase. However, the static analysis reveals significant underlying risks. All SQL queries are executed without prepared statements, posing a high risk of SQL injection. Additionally, all output escaping is missing, making the plugin vulnerable to cross-site scripting (XSS) attacks. The taint analysis further highlights these concerns with three high-severity flows involving unsanitized paths, suggesting potential for code execution or sensitive data exposure.

While the plugin's limited attack surface and lack of recorded CVEs are encouraging, the critical findings in the code analysis regarding raw SQL and unescaped output, coupled with high-severity taint flows, present immediate and serious security threats. The absence of nonce and capability checks on the limited entry points (though there are none identified as unprotected) is a notable weakness. The plugin's current state, despite its clean history, requires careful consideration due to these fundamental security flaws. Prioritizing remediation of the SQL injection and XSS vulnerabilities is paramount.

Key Concerns

  • All SQL queries use raw SQL
  • No output escaping detected
  • 3 High severity taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Blog Voyeur Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Blog Voyeur Code Analysis

Dangerous Functions
0
Raw SQL Queries
8
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared8 total queries

Output Escaping

0% escaped7 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
voyeur_welcome (voyeur.php:169)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Blog Voyeur Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuvoyeur.php:56
actioninitvoyeur.php:146
actioncomment_formvoyeur.php:153
actionwp_footervoyeur.php:167
filterthe_contentvoyeur.php:204
Maintenance & Trust

Blog Voyeur Maintenance & Trust

Maintenance Signals

WordPress version tested2.3.1
Last updatedDec 23, 2007
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Blog Voyeur Developer Profile

Donncha O Caoimh (a11n)

12 plugins · 32K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
4657 days
View full developer profile
Detection Fingerprints

How We Detect Blog Voyeur

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/blog-voyeur/style.css/wp-content/plugins/blog-voyeur/script.js
Script Paths
/wp-content/plugins/blog-voyeur/script.js
Version Parameters
blog-voyeur/style.css?ver=blog-voyeur/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
voyeurcommentform
HTML Comments
<!-- document.getElementById('voyeurcommentform').innerHTML = '<p><img src="'; --><!-- TODO -->
FAQ

Frequently Asked Questions about Blog Voyeur