CU Debug Tool by CodeUnion Security & Risk Analysis

wordpress.org/plugins/cu-debug-tool

A professional, modular debugging toolbar for developers. Inspect SQL, Rewrite Rules, Hooks, Cron events, and Options without cluttering the frontend.

10 active installs v7.2.1 PHP 7.4+ WP 5.8+ Updated Jan 29, 2026
debugdebuggerdeveloperhookssql
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is CU Debug Tool by CodeUnion Safe to Use in 2026?

Generally Safe

Score 100/100

CU Debug Tool by CodeUnion has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The cu-debug-tool v7.2.1 plugin exhibits a generally positive security posture, with several good practices in place. The complete absence of known CVEs and the excellent output escaping (97%) are significant strengths. The plugin also implements nonce checks on all identified AJAX handlers and includes capability checks, indicating an effort to secure its entry points. The fact that there are no taint analysis findings further suggests a lack of easily exploitable vulnerabilities through data flow analysis.

However, a key concern arises from the database interaction. All three SQL queries are executed without prepared statements. This is a significant risk, as it opens the door to potential SQL injection vulnerabilities if any user-controlled data is directly incorporated into these queries. While the static analysis didn't reveal specific taint flows leading to these queries, the potential for injection remains a serious weakness. The plugin also performs file operations, and without further analysis, it's impossible to definitively rule out risks associated with these operations, especially if they involve user-supplied paths or data.

Overall, cu-debug-tool v7.2.1 benefits from a clean vulnerability history and strong input sanitization for output. The primary area of concern is the lack of prepared statements for SQL queries, which represents a critical security gap that needs immediate attention. While the attack surface appears protected, the underlying database queries present a significant risk.

Key Concerns

  • All SQL queries use raw statements
Vulnerabilities
None known

CU Debug Tool by CodeUnion Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CU Debug Tool by CodeUnion Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

CU Debug Tool by CodeUnion Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
5
155 escaped
Nonce Checks
8
Capability Checks
10
File Operations
4
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

97% escaped160 total outputs
Attack Surface

CU Debug Tool by CodeUnion Attack Surface

Entry Points8
Unprotected0

AJAX Handlers 8

authwp_ajax_cudbgt_inspect_hookincludes\modules\class-cudbgt-hooks.php:49
authwp_ajax_cudbgt_get_optionincludes\modules\class-cudbgt-inspector.php:48
authwp_ajax_cudbgt_clear_logincludes\modules\class-cudbgt-logs.php:49
authwp_ajax_cudbgt_test_rewriteincludes\modules\class-cudbgt-rewrites.php:49
authwp_ajax_cudbgt_tool_flush_rewritesincludes\modules\class-cudbgt-tools.php:49
authwp_ajax_cudbgt_tool_clear_transientsincludes\modules\class-cudbgt-tools.php:50
authwp_ajax_cudbgt_tool_delete_single_transientincludes\modules\class-cudbgt-tools.php:51
authwp_ajax_cudbgt_tool_mail_testincludes\modules\class-cudbgt-tools.php:52
WordPress Hooks 4
actionwp_enqueue_scriptsincludes\class-cudbgt-loader.php:70
actionwp_footerincludes\class-cudbgt-loader.php:71
filtertemplate_includeincludes\modules\class-cudbgt-globals.php:58
filterwp_mailincludes\modules\class-cudbgt-mails.php:56
Maintenance & Trust

CU Debug Tool by CodeUnion Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 29, 2026
PHP min version7.4
Downloads173

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

CU Debug Tool by CodeUnion Developer Profile

hydr4x

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CU Debug Tool by CodeUnion

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cu-debug-tool/assets/build/css/styles.css/wp-content/plugins/cu-debug-tool/assets/build/js/app.js
Script Paths
/wp-content/plugins/cu-debug-tool/assets/build/js/app.js
Version Parameters
cu-debug-tool/assets/build/css/styles.css?ver=cu-debug-tool/assets/build/js/app.js?ver=

HTML / DOM Fingerprints

CSS Classes
cuToolbarcuToolbar--wrapcuToolbar__wrappercuInputcuToolbar__btncuToolbar__btn--primarycuToolbar__btn--iconcuToolbar__helpBox+1 more
HTML Comments
<!-- TEMPLATE: This file is part of the CU Debug Tool. --><!-- TAB: Hooks --><!-- TAB: Inspector -->
Data Attributes
data-cu-inspector-inputdata-cu-inspector-btndata-cu-inspector-help-buttondata-cu-inspector-help-boxdata-active
JS Globals
cudbgtDebugParams
FAQ

Frequently Asked Questions about CU Debug Tool by CodeUnion