Debug Elementor Security & Risk Analysis

wordpress.org/plugins/debug-elementor

Debugging plugin for Elementor to display post/page data saved by Elementor page builder.

50 active installs v1.0.0 PHP 5.6+ WP 4.7+ Updated Jul 6, 2019
debugelementorfeed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Debug Elementor Safe to Use in 2026?

Generally Safe

Score 85/100

Debug Elementor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "debug-elementor" v1.0.0 plugin presents a generally positive security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the complete reliance on prepared statements for SQL queries and the lack of file operations or external HTTP requests are excellent security practices.

However, a critical concern arises from the output escaping analysis, where 100% of outputs are not properly escaped. This represents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the WordPress site. The lack of nonce checks and capability checks also means that any potential entry points, even if currently zero, would be unprotected, further exacerbating the XSS risk.

The vulnerability history being entirely clear is a strong positive indicator. It suggests that the developers have either maintained a good security track record or that the plugin is relatively new and hasn't yet attracted malicious attention or revealed significant flaws. Despite the clean history, the identified output escaping issue is a serious flaw that needs immediate attention. The plugin's strengths lie in its minimal attack surface and secure data handling for SQL, but its weakness in output sanitization is a pressing concern.

Key Concerns

  • 100% of outputs are not properly escaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Debug Elementor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Debug Elementor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Debug Elementor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadeddebug-elementor.php:106
actioninitdebug-elementor.php:109
filterfeed_content_typedebug-elementor.php:110
filterpre_get_postsdebug-elementor.php:111
actionplugins_loadeddebug-elementor.php:269
Maintenance & Trust

Debug Elementor Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedJul 6, 2019
PHP min version5.6
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

Debug Elementor Developer Profile

Rami Yushuvaev

4 plugins · 250 total installs

80
trust score
Avg Security Score
80/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug Elementor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/wp-json/debug-elementor/v1/feed
FAQ

Frequently Asked Questions about Debug Elementor