Database Read Replicas Security & Risk Analysis

wordpress.org/plugins/database-read-replicas

BETA: Extend WordPress with MySQL database read replica support for greater speed and scalability

10 active installs v1.0.0 PHP + WP 3.0.0+ Updated Nov 24, 2016
cachedatabasemysqlreadwpdb
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Database Read Replicas Safe to Use in 2026?

Generally Safe

Score 85/100

Database Read Replicas has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "database-read-replicas" plugin v1.0.0 demonstrates a very strong initial security posture, based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface, with zero identified entry points and zero unprotected ones. Furthermore, the code signals indicate a responsible approach to SQL queries, with 100% utilizing prepared statements, and no dangerous functions, file operations, or external HTTP requests were detected. This lack of known vulnerabilities and historical issues further strengthens the impression of a secure plugin.

However, a significant concern arises from the output escaping analysis. With one total output and 0% properly escaped, this presents a clear risk. Any data displayed to users that originates from potentially untrusted sources could be vulnerable to cross-site scripting (XSS) attacks. While the plugin's limited attack surface and secure handling of database interactions are commendable, this oversight in output sanitization creates a critical vulnerability that could be exploited. The lack of nonce and capability checks, while not immediately problematic due to the absence of entry points, would become a significant issue if any new entry points were introduced without proper security measures.

In conclusion, the plugin excels in its limited attack surface and secure database interaction. The absence of historical vulnerabilities is a positive indicator. The primary weakness lies in the unescaped output, which is a serious concern and needs immediate attention. The lack of capability and nonce checks, while currently mitigated by the small attack surface, represents potential future risks if the plugin evolves.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Database Read Replicas Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Database Read Replicas Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Database Read Replicas Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Database Read Replicas Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedNov 24, 2016
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Database Read Replicas Developer Profile

jamesdlow

11 plugins · 390 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
9 days
View full developer profile
Detection Fingerprints

How We Detect Database Read Replicas

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Database Read Replicas