Dev Studio Security & Risk Analysis

wordpress.org/plugins/dev-studio

Development environment for Wordpress developers

0 active installs v2.0.0 PHP 7.0+ WP 4.0+ Updated Nov 27, 2021
debugdebug-bardebuggingdev-studiodevelopment
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dev Studio Safe to Use in 2026?

Generally Safe

Score 85/100

Dev Studio has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "dev-studio" v2.0.0 plugin presents a mixed security posture. On the positive side, it demonstrates good practices by using prepared statements for all SQL queries and lacks any known historical vulnerabilities, suggesting a generally secure development approach. There are no recorded CVEs, and the plugin does not make external HTTP requests, which are excellent security indicators.

However, several concerning signals emerge from the static analysis. The presence of "unserialize" as a dangerous function is a significant red flag, as it can lead to remote code execution if not handled with extreme care and proper sanitization of the serialized data. While there are no directly observed unsanitized taint flows with critical or high severity, the potential for abuse with unserialize is inherently high. Furthermore, only 65% of output is properly escaped, indicating a risk of cross-site scripting (XSS) vulnerabilities. The lack of capability checks on entry points is also a concern, though the absence of unprotected AJAX handlers mitigates this somewhat.

In conclusion, while "dev-studio" v2.0.0 benefits from a clean vulnerability history and secure SQL handling, the presence of "unserialize" and the moderate rate of output escaping introduce notable risks. The absence of capability checks on AJAX handlers requires careful monitoring, and the potential for XSS and code execution via unserialize should be addressed promptly. The plugin's strengths lie in its lack of external dependencies and SQL injection vulnerabilities, but these are overshadowed by the risks associated with dangerous functions and insufficient output sanitization.

Key Concerns

  • Dangerous function 'unserialize' detected
  • Output escaping only 65% (potential XSS)
  • Nonce check present, but capability check absent
Vulnerabilities
None known

Dev Studio Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dev Studio Release Timeline

v2.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Dev Studio Code Analysis

Dangerous Functions
10
Raw SQL Queries
0
6 prepared
Unescaped Output
53
99 escaped
Nonce Checks
1
Capability Checks
0
File Operations
15
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserializereturn unserialize($data);app/Modules/Wordpress/Components/Locale/Locale.php:48
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Rewrite/Rewrite.php:78
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Roles/Roles.php:110
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Scripts/Scripts.php:49
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Scripts/Scripts.php:250
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Scripts/Scripts.php:429
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Styles/Styles.php:49
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Styles/Styles.php:237
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Styles/Styles.php:423
unserializereturn unserialize($data);app/Modules/Wordpress/Components/Theme/Theme.php:241

SQL Query Safety

100% prepared6 total queries

Output Escaping

65% escaped152 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<Options> (app/Core/Fields/Options.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Dev Studio Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_dev_studioapp/DevStudio.php:223
noprivwp_ajax_dev_studioapp/DevStudio.php:224
authwp_ajax_dev_studio_testapp/DevStudio.php:225
noprivwp_ajax_dev_studio_testapp/DevStudio.php:226
WordPress Hooks 10
actionadmin_menuapp/Core/Fields/Container.php:26
actionplugins_loadedapp/DevStudio.php:229
actionplugin_loadedapp/DevStudio.php:303
actionwp_enqueue_scriptsapp/DevStudio.php:376
actionadmin_enqueue_scriptsapp/DevStudio.php:377
actionadmin_bar_menuapp/DevStudio.php:380
actionshutdownapp/DevStudio.php:405
actionshutdownapp/DevStudio.php:406
actionshutdownapp/DevStudio.php:409
filtertemplate_includeapp/Modules/Wordpress/Components/Overview/Overview.php:54
Maintenance & Trust

Dev Studio Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedNov 27, 2021
PHP min version7.0
Downloads4K

Community Trust

Rating100/100
Number of ratings6
Active installs0
Developer Profile

Dev Studio Developer Profile

SolidBunch

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dev Studio

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dev-studio/app/Core/Assets/css/app.css/wp-content/plugins/dev-studio/app/Core/Assets/js/app.js/wp-content/plugins/dev-studio/app/Core/Assets/js/vendor.js
Script Paths
/wp-content/plugins/dev-studio/app/Core/Assets/js/app.js/wp-content/plugins/dev-studio/app/Core/Assets/js/vendor.js
Version Parameters
dev-studio/app/Core/Assets/css/app.css?ver=dev-studio/app/Core/Assets/js/app.js?ver=dev-studio/app/Core/Assets/js/vendor.js?ver=

HTML / DOM Fingerprints

JS Globals
window.DevStudio
FAQ

Frequently Asked Questions about Dev Studio