Debug Bar Post Meta Security & Risk Analysis

wordpress.org/plugins/debug-bar-post-meta

Adds a post meta panel for displaying all of the post meta.

40 active installs v0.5.8 PHP + WP 3.4+ Updated Aug 18, 2020
debugtemplatetrace
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Debug Bar Post Meta Safe to Use in 2026?

Generally Safe

Score 85/100

Debug Bar Post Meta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "debug-bar-post-meta" plugin, at version 0.5.8, exhibits a generally positive security posture with no recorded vulnerabilities or known CVEs. The static analysis indicates a clean codebase regarding SQL injection and output escaping, with all SQL queries utilizing prepared statements and all outputs being properly escaped. Furthermore, the plugin does not engage in file operations or external HTTP requests, and its attack surface is reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. This suggests a thoughtful approach to secure development by the plugin authors.

However, a notable concern is the presence of the `unserialize()` function. While the static analysis did not detect any taint flows indicating this function is currently being exploited, its use is inherently risky as it can lead to Remote Code Execution (RCE) if untrusted data is passed to it. The absence of capability checks and nonce checks, though not directly tied to current reported vulnerabilities, is also a potential weakness that could be exploited in conjunction with other vulnerabilities or in future plugin versions. The lack of recorded vulnerabilities is a strength, but the potential risk from `unserialize()` and the absence of certain security controls prevent a perfect score.

In conclusion, "debug-bar-post-meta" v0.5.8 appears to be a securely coded plugin for its intended purpose, with a strong emphasis on preventing common web vulnerabilities. The absence of historical vulnerabilities further bolsters confidence. The primary area for improvement and potential risk lies in the use of `unserialize()` and the general lack of explicit authentication and authorization checks on its (albeit small) entry points, which could be exploited under different circumstances.

Key Concerns

  • Use of unserialize() function
  • No capability checks implemented
  • No nonce checks implemented
Vulnerabilities
None known

Debug Bar Post Meta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Debug Bar Post Meta Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$vals .= print_r( unserialize( $value ), true ); // phpcs:ignoreclass-debug-bar-post-meta.php:45

Output Escaping

100% escaped3 total outputs
Attack Surface

Debug Bar Post Meta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actiondebug_bar_panelsdebug-bar-post-meta.php:21
Maintenance & Trust

Debug Bar Post Meta Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 18, 2020
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Debug Bar Post Meta Developer Profile

Jake Spurlock

8 plugins · 180 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug Bar Post Meta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/debug-bar-post-meta/css/debug-bar-post-meta.css
Version Parameters
debug-bar-post-meta-css?ver=0.5.8

HTML / DOM Fingerprints

CSS Classes
template-tracedebug-bar-post-meta
FAQ

Frequently Asked Questions about Debug Bar Post Meta