
Blog Voyeur Security & Risk Analysis
wordpress.org/plugins/blog-voyeurLog by name where and when users visit your blog.
Is Blog Voyeur Safe to Use in 2026?
Generally Safe
Score 85/100Blog Voyeur has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "blog-voyeur" plugin v0.2 exhibits a mixed security posture. On the positive side, it has a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of known vulnerabilities in its history is a strong indicator of good past development practices and a potentially stable codebase. However, the static analysis reveals significant underlying risks. All SQL queries are executed without prepared statements, posing a high risk of SQL injection. Additionally, all output escaping is missing, making the plugin vulnerable to cross-site scripting (XSS) attacks. The taint analysis further highlights these concerns with three high-severity flows involving unsanitized paths, suggesting potential for code execution or sensitive data exposure.
While the plugin's limited attack surface and lack of recorded CVEs are encouraging, the critical findings in the code analysis regarding raw SQL and unescaped output, coupled with high-severity taint flows, present immediate and serious security threats. The absence of nonce and capability checks on the limited entry points (though there are none identified as unprotected) is a notable weakness. The plugin's current state, despite its clean history, requires careful consideration due to these fundamental security flaws. Prioritizing remediation of the SQL injection and XSS vulnerabilities is paramount.
Key Concerns
- All SQL queries use raw SQL
- No output escaping detected
- 3 High severity taint flows
- No nonce checks
- No capability checks
Blog Voyeur Security Vulnerabilities
Blog Voyeur Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Blog Voyeur Attack Surface
WordPress Hooks 5
Maintenance & Trust
Blog Voyeur Maintenance & Trust
Maintenance Signals
Community Trust
Blog Voyeur Alternatives
Chap Secure Password Login
chap-secure-login
Do not show password, during login, on an insecure channel (without SSL). Use a SHA-256 hash algorithm.
Force User Login Multisite
force-user-login-multisite
Makes your wordpress blog private unless the user is logged in, optionally setting a minium user level. Modified from http://wordpress.
Encrypt My Login Password
encrypt-my-login-password
Do not show password on login page.
Stats for WP
stats-for-wp
When users view your site, we will log user ID, view pages, referrers URL, user IP, user agent, ... and so on, to admin you understand how users worki …
Simple History – Track, Log, and Audit WordPress Changes
simple-history
Track changes and user activities on your WordPress site. See who created a page, uploaded an attachment, and more, for a complete audit trail.
Blog Voyeur Developer Profile
12 plugins · 32K total installs
How We Detect Blog Voyeur
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/blog-voyeur/style.css/wp-content/plugins/blog-voyeur/script.js/wp-content/plugins/blog-voyeur/script.jsblog-voyeur/style.css?ver=blog-voyeur/script.js?ver=HTML / DOM Fingerprints
voyeurcommentform<!--
document.getElementById('voyeurcommentform').innerHTML = '<p><img src="'; --><!-- TODO -->