dbViewer Security & Risk Analysis

wordpress.org/plugins/dbviewer

View your WordPress database tables and data from your WordPress admin dashboard.

0 active installs v1.0.0 PHP 7.4+ WP 5.8.3+ Updated Unknown
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is dbViewer Safe to Use in 2026?

Generally Safe

Score 100/100

dbViewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the static analysis, the "dbviewer" plugin v1.0.0 exhibits a strong security posture in several key areas. The plugin has a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and all entry points are protected by authentication. Crucially, all identified output operations are properly escaped, and there are no file operations or external HTTP requests, which significantly reduces the risk of common web vulnerabilities like XSS and information disclosure.

The primary area of concern lies in the handling of SQL queries. The analysis shows 3 SQL queries, none of which are using prepared statements. This presents a significant risk of SQL injection vulnerabilities. The lack of nonce checks and capability checks, while not directly exploitable due to the absence of unprotected entry points, are generally considered good security practices that are missing here. The vulnerability history shows no past CVEs, which is positive, but it is important to note that this does not guarantee future security and the current SQL query implementation remains a significant risk.

In conclusion, while "dbviewer" v1.0.0 demonstrates good practices in limiting its attack surface and ensuring output sanitization, the absence of prepared statements for all its SQL queries is a critical weakness that needs immediate attention. The lack of other security checks like nonces and capabilities, while less critical in this specific instance due to the protected attack surface, are still areas for improvement to ensure robust security.

Key Concerns

  • SQL queries not using prepared statements
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

dbViewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

dbViewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
0
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

100% escaped10 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<dbViewer_menu_display> (views\dbViewer_menu_display.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

dbViewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menudbViewer.php:44
actionadmin_menudbViewer.php:60
filtertable_listdbViewer.php:80
filtertable_valuedbViewer.php:114
Maintenance & Trust

dbViewer Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedUnknown
PHP min version7.4
Downloads816

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

dbViewer Alternatives

No alternatives data available yet.

Developer Profile

dbViewer Developer Profile

shaykisten

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect dbViewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dbviewer/dbViewer.php

HTML / DOM Fingerprints

HTML Comments
<!-- dbViewer v1.0.0 -->
FAQ

Frequently Asked Questions about dbViewer