DB Viewer Security & Risk Analysis

wordpress.org/plugins/db-viewer

View your WordPress database directly inside your Dashboard. No need for phpMyAdmin or hosting panels.

80 active installs v1.0.0 PHP 7.0.0+ WP 5.3.0+ Updated Aug 17, 2025
databasephpmyadminsqltablesview
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is DB Viewer Safe to Use in 2026?

Generally Safe

Score 100/100

DB Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The plugin 'db-viewer' v1.0.0 demonstrates a generally good security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the attack surface. The code also exhibits strong output escaping practices, with 96% of outputs properly escaped, and a high percentage of SQL queries utilizing prepared statements, which are crucial for preventing SQL injection. The presence of nonce checks and capability checks, while limited in number, indicates some awareness of security best practices.

Despite these strengths, there are a couple of areas that warrant attention. The taint analysis revealed two flows with unsanitized paths, even though they were not classified as critical or high severity. This suggests a potential for path traversal vulnerabilities if these flows are exposed to user-controlled input. Additionally, the presence of 'Select2' as a bundled library could be a concern if it's an outdated version, as bundled libraries can introduce vulnerabilities if not maintained. The plugin's history of zero known CVEs is highly positive and suggests a history of secure development, but it's important to remember that past security does not guarantee future security.

In conclusion, 'db-viewer' v1.0.0 appears to be a relatively secure plugin with a minimal attack surface and good coding practices in place, particularly concerning output escaping and SQL query sanitization. The primary areas of concern are the two unsanitized path flows identified in the taint analysis and the potential for an outdated bundled library. Addressing these specific points would further enhance the plugin's security.

Key Concerns

  • Unsanitized paths in taint flows
  • Bundled library (Select2) - potential for outdated version
Vulnerabilities
None known

DB Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

DB Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
20 prepared
Unescaped Output
15
341 escaped
Nonce Checks
3
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Select2

SQL Query Safety

83% prepared24 total queries

Output Escaping

96% escaped356 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ajax_show_unserialized (includes\AJAXs\TableAJAX.php:119)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

DB Viewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedgpls-wpdbclr-db-controller.php:245
actionadmin_enqueue_scriptsincludes\Core\Core.php:191
actioninitincludes\Pages\PagesBase\AdminPage.php:150
filterwoocommerce_settings_tabs_arrayincludes\Pages\PagesBase\AdminPage.php:222
actionnetwork_admin_menuincludes\Pages\PagesBase\AdminPage.php:298
actionnetwork_admin_menuincludes\Pages\PagesBase\AdminPage.php:300
actionadmin_menuincludes\Pages\PagesBase\AdminPage.php:301
actionadmin_menuincludes\Pages\PagesBase\AdminPage.php:303
actionadmin_enqueue_scriptsincludes\Pages\PagesBase\AdminPage.php:306
Maintenance & Trust

DB Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 17, 2025
PHP min version7.0.0
Downloads929

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

DB Viewer Developer Profile

GrandPlugins

20 plugins · 9K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
160 days
View full developer profile
Detection Fingerprints

How We Detect DB Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/db-viewer/assets/css/backend.css/wp-content/plugins/db-viewer/assets/js/backend.js
Script Paths
/wp-content/plugins/db-viewer/assets/js/backend.js
Version Parameters
db-viewer/assets/css/backend.css?ver=db-viewer/assets/js/backend.js?ver=

HTML / DOM Fingerprints

CSS Classes
gpls-wpdbclr-wrappergpls-wpdbclr-content
Data Attributes
data-gpls-wpdbclr-id
JS Globals
gpls_wpdbclr_localize_data
REST Endpoints
/wp-json/gpls-wpdbclr/v1/settings/wp-json/gpls-wpdbclr/v1/tables/wp-json/gpls-wpdbclr/v1/table-data/wp-json/gpls-wpdbclr/v1/query
Shortcode Output
[db_viewer]
FAQ

Frequently Asked Questions about DB Viewer