DB Signatures Security & Risk Analysis

wordpress.org/plugins/db-signatures

Add some HTML content to the bottom of every posts, pages and custom post types.

10 active installs v1.0 PHP + WP 3.5+ Updated Feb 9, 2014
adsbannerscustom-footerfootersignatures
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DB Signatures Safe to Use in 2026?

Generally Safe

Score 85/100

DB Signatures has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "db-signatures" v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the reported absence of dangerous functions, file operations, and external HTTP requests, combined with 100% of SQL queries using prepared statements, indicates good coding practices in these critical areas. The presence of nonce checks is also a positive sign for input validation.

However, a significant concern arises from the complete lack of proper output escaping (0% escaped). This means that any data rendered to the user could potentially be vulnerable to cross-site scripting (XSS) attacks, depending on the nature of the plugin's output. The absence of capability checks is also noteworthy, as it suggests that plugin functionality might not be adequately protected against unauthorized access by lower-privileged users.

The plugin's vulnerability history shows zero known CVEs, which is an excellent track record. This lack of past vulnerabilities, coupled with the absence of critical taint flows, suggests that the plugin has historically been well-maintained and secure. Despite the strengths in attack surface reduction and SQL handling, the unescaped output represents a tangible risk that needs to be addressed to achieve a robust security profile.

Key Concerns

  • Unescaped output
  • Missing capability checks
Vulnerabilities
None known

DB Signatures Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

DB Signatures Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

DB Signatures Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitdb-signatures-post-type.php:23
actionadd_meta_boxesdb-signatures-post-type.php:24
actionsave_postdb-signatures-post-type.php:25
actionadmin_menudb-signatures-post-type.php:26
actionadmin_menudb-signatures-post-type.php:27
filtermanage_edit-db-signatures_columnsdb-signatures-post-type.php:30
actionadd_meta_boxesdb-signatures.php:48
actionsave_postdb-signatures.php:49
filterthe_contentdb-signatures.php:52
Maintenance & Trust

DB Signatures Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 9, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

DB Signatures Developer Profile

David Beja

3 plugins · 30 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DB Signatures

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
db_signatures_signature_db_signatures_signaturedb_signatures_signature_nonce_db_signatures_show_on
FAQ

Frequently Asked Questions about DB Signatures