dbug Security & Risk Analysis

wordpress.org/plugins/dbug

Simple error debugging and logging functions.

10 active installs v1.9.8 PHP + WP 4.0+ Updated Jan 29, 2018
debugerror-log
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is dbug Safe to Use in 2026?

Generally Safe

Score 85/100

dbug has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "dbug" plugin v1.9.8 exhibits a mixed security posture. On one hand, it has a very small attack surface, with no recorded AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all identified SQL queries utilize prepared statements, which is a strong security practice. The plugin also has no known vulnerability history, suggesting a history of relative stability.

However, significant concerns arise from the static code analysis. The presence of the `create_function` dangerous function is a critical vulnerability in itself, as it can be exploited for code injection if user-supplied data is passed to it without proper sanitization. Compounding this, 100% of the plugin's output is not properly escaped. This means that any data displayed by the plugin that originates from user input or other untrusted sources is vulnerable to Cross-Site Scripting (XSS) attacks. The lack of nonce and capability checks across all entry points further exacerbates these risks, allowing unauthenticated or unauthorized users to potentially trigger vulnerable code paths.

In conclusion, while the plugin's minimal attack surface and prepared SQL statements are positive attributes, the identified dangerous function and pervasive lack of output escaping present serious security risks. The absence of any past vulnerabilities is encouraging but does not mitigate the immediate dangers posed by the current code. Users should be highly cautious and consider whether the functionality provided by this plugin outweighs the significant security implications.

Key Concerns

  • Use of dangerous function create_function
  • 100% of outputs are not properly escaped
  • No nonce checks found
  • No capability checks found
Vulnerabilities
None known

dbug Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

dbug Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
12
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('admin_notices', create_function("", 'function(){_plugin.php:16

Output Escaping

0% escaped12 total outputs
Attack Surface

dbug Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_notices_plugin.php:16
Maintenance & Trust

dbug Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJan 29, 2018
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

dbug Developer Profile

postpostmodern

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect dbug

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dbug/css/dbug.css/wp-content/plugins/dbug/js/dbug.js
Script Paths
/wp-content/plugins/dbug/js/dbug.js
Version Parameters
dbug/css/dbug.css?ver=dbug/js/dbug.js?ver=

HTML / DOM Fingerprints

CSS Classes
dbug-debug-wrapper
Data Attributes
data-dbug-element-id
JS Globals
dbug
FAQ

Frequently Asked Questions about dbug