Empty WP Blog/Website Security & Risk Analysis

wordpress.org/plugins/empty-wp-blog-or-website

One click solution for make your blog/website empty. Delete all your posts, pages, media(images,videos,etc) , tags and categories.

60 active installs v1.1 PHP + WP 2.0.2+ Updated May 8, 2015
delete-postsdelete-usersempty-pagesempty-tagsempty-wp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Empty WP Blog/Website Safe to Use in 2026?

Generally Safe

Score 85/100

Empty WP Blog/Website has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "empty-wp-blog-or-website" v1.1 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of known attack surface entry points like AJAX handlers, REST API routes, shortcodes, and cron events is a significant strength, indicating a plugin that doesn't expose itself to common web attack vectors. Furthermore, the lack of dangerous functions, file operations, and external HTTP requests, along with the sole use of prepared statements for SQL queries, are excellent security practices. The plugin also demonstrates awareness of WordPress security by including a capability check. This suggests a well-developed and security-conscious approach to its implementation.

However, a notable concern arises from the output escaping analysis, where 100% of the observed outputs are not properly escaped. This lack of escaping on all identified output points presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. If any data that is displayed to users originates from an untrusted source and is not escaped, an attacker could inject malicious JavaScript. The absence of any recorded vulnerabilities in its history is a positive indicator, but it should not overshadow the critical risk posed by unescaped output, as even a single vulnerability can have significant consequences.

In conclusion, while the plugin's architecture is commendably secure with no discernible attack surface and good data handling for SQL, the critical flaw of unescaped output demands immediate attention. The plugin developer should prioritize implementing proper output escaping mechanisms for all user-facing content. The absence of historical vulnerabilities is encouraging, but the current code analysis reveals a tangible and potentially severe risk.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Empty WP Blog/Website Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Empty WP Blog/Website Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Empty WP Blog/Website Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuempty-wp-blog.php:11
Maintenance & Trust

Empty WP Blog/Website Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 8, 2015
PHP min version
Downloads14K

Community Trust

Rating56/100
Number of ratings4
Active installs60
Developer Profile

Empty WP Blog/Website Developer Profile

Anoop M C

1 plugin · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Empty WP Blog/Website

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
button
Data Attributes
name="delete_whole"value="Click here to Empty your Website/Blog"name="business"value="anoopmmc@gmail.com"name="lc"value="US"+8 more
Shortcode Output
<h2>Empty WP Blog/Website</h2>
FAQ

Frequently Asked Questions about Empty WP Blog/Website