Debug Meta Data Security & Risk Analysis

wordpress.org/plugins/debug-meta-data

Creates a meta-box with meta-data information of a post for all post types. Information with meta key, meta value and its var_dump

40 active installs v1.1.2 PHP + WP 4.0.0+ Updated Mar 12, 2020
debugdebug-metadebug-metaboxmeta-datameta-data-custom-post-types
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEOct 20, 2020
Safety Verdict

Is Debug Meta Data Safe to Use in 2026?

Use With Caution

Score 64/100

Debug Meta Data has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Oct 20, 2020Updated 6yr ago
Risk Assessment

The 'debug-meta-data' plugin v1.1.2 exhibits a concerning security posture despite its minimal attack surface and lack of detected taint flows. While the plugin has no direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication, and it correctly avoids dangerous functions and raw SQL queries, significant weaknesses are present. A major concern is the complete absence of output escaping, meaning any data rendered by the plugin could be vulnerable to cross-site scripting (XSS) attacks. This lack of sanitization is a critical flaw that could allow attackers to inject malicious scripts into the WordPress admin area or even to end-users, depending on where the meta-data is displayed.

The plugin's vulnerability history is also a red flag. It has a known unpatched medium severity CVE related to Cross-Site Scripting (XSS). The fact that this vulnerability remains unpatched and the plugin has not been updated since October 2020 indicates a lack of ongoing maintenance and security diligence. While the static analysis did not detect any current XSS vulnerabilities in v1.1.2, the historical pattern strongly suggests a recurring weakness in how the plugin handles user-supplied or meta-data. In conclusion, while the plugin's architecture minimizes direct attack vectors and uses prepared statements, the critical flaw of unescaped output coupled with an unpatched XSS vulnerability from its history makes this plugin a significant risk. The lack of maintenance is a major concern for future security.

Key Concerns

  • Unpatched CVE found
  • Output escaping is not properly implemented
  • No capability checks found
  • No nonce checks found
Vulnerabilities
1 published

Debug Meta Data Security Vulnerabilities

CVEs by Year

1 CVE in 2020 · unpatched
2020
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2020-27356medium · 5.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Debug Meta Data <= 1.1.2 - Stored Cross-Site Scripting

Oct 20, 2020Unpatched
Version History

Debug Meta Data Release Timeline

v1.1.2Current1 CVE
v1.1.11 CVE
v1.1.01 CVE
v1.0.51 CVE
v1.0.41 CVE
v1.0.31 CVE
v1.0.21 CVE
v1.0.11 CVE
v1.0.01 CVE
Code Analysis
Analyzed Mar 16, 2026

Debug Meta Data Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Debug Meta Data Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadd_meta_boxesdebug-meta-data.php:84
actionshow_user_profiledebug-meta-data.php:114
actionedit_user_profiledebug-meta-data.php:115
Maintenance & Trust

Debug Meta Data Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.0
Last updatedMar 12, 2020
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Debug Meta Data Developer Profile

Ahmad Awais

6 plugins · 2K total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug Meta Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<h3>All Meta Data</h3><strong></strong> => =>
FAQ

Frequently Asked Questions about Debug Meta Data