DB Table Viewer Security & Risk Analysis

wordpress.org/plugins/db-table-viewer

A WordPress plugin to display database table data with pagination in a user-friendly format.

100 active installs v1.0 PHP 7.2+ WP 5.0+ Updated Feb 5, 2025
admindatabasepaginationtableviewer
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is DB Table Viewer Safe to Use in 2026?

Generally Safe

Score 92/100

DB Table Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The db-table-viewer v1.0 plugin exhibits a strong security posture based on the provided static analysis. The code demonstrates good practices by utilizing prepared statements for all SQL queries and properly escaping all outputs. The absence of dangerous functions, file operations, and external HTTP requests further enhances its security. Furthermore, the plugin has no recorded vulnerability history, indicating a history of stable and secure development.

However, a key concern arises from the lack of nonce checks on its single AJAX handler. While a capability check is present, the absence of nonce validation leaves the AJAX endpoint potentially vulnerable to Cross-Site Request Forgery (CSRF) attacks. This means an attacker could trick a logged-in user into executing unintended actions by submitting a crafted request to the plugin's AJAX handler.

In conclusion, while the plugin is architecturally sound in most areas, the missing nonce check on the AJAX handler represents a specific, albeit addressable, security weakness. The absence of known vulnerabilities and the use of secure coding practices are significant strengths, but the CSRF risk should be mitigated.

Key Concerns

  • Missing nonce check on AJAX handler
Vulnerabilities
None known

DB Table Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DB Table Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
0
8 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared5 total queries

Output Escaping

100% escaped8 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
get_table_data (db-table-viewer.php:96)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DB Table Viewer Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_get_table_datadb-table-viewer.php:25
WordPress Hooks 2
actionadmin_menudb-table-viewer.php:23
actionadmin_enqueue_scriptsdb-table-viewer.php:24
Maintenance & Trust

DB Table Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 5, 2025
PHP min version7.2
Downloads866

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

DB Table Viewer Developer Profile

Vrutika Darji

1 plugin · 100 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DB Table Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/db-table-viewer/assets/js/db-table-viewer.js/wp-content/plugins/db-table-viewer/assets/css/db-table-viewer.css
Script Paths
/wp-content/plugins/db-table-viewer/assets/js/db-table-viewer.js
Version Parameters
db-table-viewer/assets/js/db-table-viewer.js?ver=1.0db-table-viewer/assets/css/db-table-viewer.css?ver=1.0

HTML / DOM Fingerprints

CSS Classes
page-button
Data Attributes
data-page
JS Globals
DBTableViewer
REST Endpoints
/wp-json/wp/v2/users
FAQ

Frequently Asked Questions about DB Table Viewer