
Enhanced Plugin Admin Security & Risk Analysis
wordpress.org/plugins/enhanced-plugin-adminAt-a-glance diagnostic and security info displayed on your site's plugin page about the plugins you have installed (both active and inactive).
Is Enhanced Plugin Admin Safe to Use in 2026?
Generally Safe
Score 99/100Enhanced Plugin Admin has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.
The "enhanced-plugin-admin" plugin v1.17 exhibits a mixed security posture. While it demonstrates strengths in areas like SQL query preparation and a seemingly small attack surface from static analysis, significant concerns arise from its historical vulnerability record and output escaping deficiencies. The plugin has a history of two medium-severity vulnerabilities, including Cross-Site Request Forgery (CSRF) and Cross-site Scripting (XSS), indicating potential issues with input validation and secure handling of user-supplied data in the past. The fact that the last vulnerability was relatively recent (March 2023) suggests ongoing security challenges.
Specific risks identified in the code analysis include a low percentage of properly escaped output (21%), which is a significant concern as it directly contributes to the risk of Cross-site Scripting vulnerabilities. Although there are no critical or high severity taint flows and all SQL queries are prepared, the low output escaping rate presents a tangible risk. The presence of an external HTTP request also warrants investigation for potential vulnerabilities if not handled securely. The plugin's vulnerability history, particularly the types of past issues (CSRF, XSS), aligns with the observed output escaping problems and reinforces the need for vigilance in sanitizing user-controllable data.
In conclusion, while the plugin has made positive strides in securing SQL operations and has a low apparent attack surface in terms of entry points, the persistent issues with output escaping and the history of medium-severity vulnerabilities, including XSS and CSRF, point to an area requiring immediate attention. The overall security posture is therefore considered moderate, with a need for improvement in output sanitization and a cautious approach due to past exploits.
Key Concerns
- Low output escaping percentage (21%)
- History of 2 medium-severity CVEs
- Presence of external HTTP request
Enhanced Plugin Admin Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Enhanced Plugin Admin <= 1.16 - Cross-Site Request Forgery via epa_options_page
Enhanced Admin Plugin < 1.16 - Reflected Cross-Site Scripting
Enhanced Plugin Admin Release Timeline
Enhanced Plugin Admin Code Analysis
Output Escaping
Data Flow Analysis
Enhanced Plugin Admin Attack Surface
WordPress Hooks 5
Maintenance & Trust
Enhanced Plugin Admin Maintenance & Trust
Maintenance Signals
Community Trust
Enhanced Plugin Admin Alternatives
MilesWeb Tools
milesweb-tools
MilesWeb Tools is a powerful WordPress plugin designed to enhance your site's functionality and security. It helps you manage security settings, …
Export Plugin Details
export-plugin-details
Simple way to export your installed plugins list in CSV format.
Plugin Activation Tracker
plugin-activation-tracker
Keep track of plugins you activate or deactivate through the dashboard by viewing when each and every one of them was enabled or disabled.
Plugin Report
plugin-report
A WordPress plugin that provides detailed information about currently installed plugins.
Plugin Activation Date
plugin-activation-date
Keep track of plugins you activate or deactivate through the dashboard by viewing when each and every one of them was enabled or disabled.
Enhanced Plugin Admin Developer Profile
7 plugins · 195K total installs
How We Detect Enhanced Plugin Admin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/enhanced-plugin-admin/epa-admin.css/wp-content/plugins/enhanced-plugin-admin/epa-admin.js/wp-content/plugins/enhanced-plugin-admin/epa-admin.jsenhanced-plugin-admin/epa-admin.css?ver=enhanced-plugin-admin/epa-admin.js?ver=HTML / DOM Fingerprints
epa-admin-plugin-row-meta<!-- epa: data from call_api --><!-- epa: data from transient --><!-- epa: call_api successful --><!-- epa: checking svn url a -->+2 more