Debug Meta Data Security & Risk Analysis

wordpress.org/plugins/debug-meta-data

Creates a meta-box with meta-data information of a post for all post types. Information with meta key, meta value and its var_dump

40 active installs v1.1.2 PHP + WP 4.0.0+ Updated Unknown
debugdebug-metadebug-metaboxmeta-datameta-data-custom-post-types
79
B · Generally Safe
CVEs total1
Unpatched1
Last CVEOct 20, 2020
Safety Verdict

Is Debug Meta Data Safe to Use in 2026?

Mostly Safe

Score 79/100

Debug Meta Data is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Oct 20, 2020
Risk Assessment

The 'debug-meta-data' plugin v1.1.2 exhibits a concerning security posture despite its minimal attack surface and lack of detected taint flows. While the plugin has no direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication, and it correctly avoids dangerous functions and raw SQL queries, significant weaknesses are present. A major concern is the complete absence of output escaping, meaning any data rendered by the plugin could be vulnerable to cross-site scripting (XSS) attacks. This lack of sanitization is a critical flaw that could allow attackers to inject malicious scripts into the WordPress admin area or even to end-users, depending on where the meta-data is displayed.

The plugin's vulnerability history is also a red flag. It has a known unpatched medium severity CVE related to Cross-Site Scripting (XSS). The fact that this vulnerability remains unpatched and the plugin has not been updated since October 2020 indicates a lack of ongoing maintenance and security diligence. While the static analysis did not detect any current XSS vulnerabilities in v1.1.2, the historical pattern strongly suggests a recurring weakness in how the plugin handles user-supplied or meta-data. In conclusion, while the plugin's architecture minimizes direct attack vectors and uses prepared statements, the critical flaw of unescaped output coupled with an unpatched XSS vulnerability from its history makes this plugin a significant risk. The lack of maintenance is a major concern for future security.

Key Concerns

  • Unpatched CVE found
  • Output escaping is not properly implemented
  • No capability checks found
  • No nonce checks found
Vulnerabilities
1

Debug Meta Data Security Vulnerabilities

CVEs by Year

1 CVE in 2020 · unpatched
2020
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2020-27356medium · 5.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Debug Meta Data <= 1.1.2 - Stored Cross-Site Scripting

Oct 20, 2020Unpatched
Code Analysis
Analyzed Mar 16, 2026

Debug Meta Data Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Debug Meta Data Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadd_meta_boxesdebug-meta-data.php:84
actionshow_user_profiledebug-meta-data.php:114
actionedit_user_profiledebug-meta-data.php:115
Maintenance & Trust

Debug Meta Data Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.0
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Debug Meta Data Developer Profile

Ahmad Awais

6 plugins · 2K total installs

80
trust score
Avg Security Score
80/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug Meta Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<h3>All Meta Data</h3><strong></strong> => =>
FAQ

Frequently Asked Questions about Debug Meta Data