Display SQL Stats Security & Risk Analysis

wordpress.org/plugins/display-sql-stats

! ! ! S T I L L B E T A ! ! !

10 active installs v0.9.5.1 PHP + WP 2.7+ Updated May 15, 2017
chartchartsgoogle-chartgoogle-chart-toolsmysql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Display SQL Stats Safe to Use in 2026?

Generally Safe

Score 85/100

Display SQL Stats has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'display-sql-stats' plugin version 0.9.5.1 exhibits a generally good security posture with no recorded vulnerabilities or critical issues identified in the static analysis. The complete absence of dangerous functions, file operations, and external HTTP requests is a strong indicator of secure coding practices. Furthermore, all SQL queries utilize prepared statements, mitigating the risk of SQL injection. The plugin also demonstrates capability checks, which is a positive sign for authorization. However, a significant concern arises from the complete lack of output escaping for all 21 identified outputs. This presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities, as unescaped user-controlled input or dynamic content could be rendered directly in the browser. The absence of nonce checks on the single shortcode is also a potential weakness, although the overall attack surface is small and there are no AJAX handlers or REST API routes that would typically require more robust nonce protection. The plugin's history of zero known CVEs suggests a well-maintained codebase, but the identified output escaping flaw demands immediate attention to ensure user data is protected from potential XSS attacks.

Key Concerns

  • All outputs are unescaped
  • No nonce checks on shortcode
Vulnerabilities
None known

Display SQL Stats Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Display SQL Stats Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
21
0 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

0% escaped21 total outputs
Attack Surface

Display SQL Stats Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dsscode] display-stats.php:281
WordPress Hooks 6
actionadmin_menudisplay-stats.php:50
actionadmin_initdisplay-stats.php:51
actionadmin_head-index.phpdisplay-stats.php:52
actionadmin_headdisplay-stats.php:54
actionwp_dashboard_setupdisplay-stats.php:150
filterplugin_action_linksdisplay-stats.php:171
Maintenance & Trust

Display SQL Stats Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 15, 2017
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Display SQL Stats Developer Profile

Juergen Schulze

6 plugins · 1K total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Display SQL Stats

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/display-sql-stats/js/chart.min.js/wp-content/plugins/display-sql-stats/js/google-charts.js/wp-content/plugins/display-sql-stats/js/dss-chart.js/wp-content/plugins/display-sql-stats/css/dss-style.css
Script Paths
/wp-content/plugins/display-sql-stats/js/chart.min.js/wp-content/plugins/display-sql-stats/js/google-charts.js/wp-content/plugins/display-sql-stats/js/dss-chart.js
Version Parameters
display-sql-stats/css/dss-style.css?ver=display-sql-stats/js/chart.min.js?ver=display-sql-stats/js/google-charts.js?ver=display-sql-stats/js/dss-chart.js?ver=

HTML / DOM Fingerprints

CSS Classes
dss_chart_container
JS Globals
dss_chart_datadss_chart_options
Shortcode Output
[display-sql-stats]
FAQ

Frequently Asked Questions about Display SQL Stats