
Exploit Scanner Security & Risk Analysis
wordpress.org/plugins/exploit-scannerSearch the files and database of your WordPress install for signs that may indicate that it has fallen victim to malicious hackers.
Is Exploit Scanner Safe to Use in 2026?
Mostly Safe
Score 84/100Exploit Scanner is generally safe to use though it hasn't been updated recently. 1 past CVE were resolved. Keep it updated.
The 'exploit-scanner' plugin v1.5.2 presents a mixed security posture. On the positive side, the static analysis reveals a limited attack surface, with all identified AJAX handlers protected by authentication checks. Furthermore, the absence of REST API routes, shortcodes, and cron events as entry points reduces the plugin's exposure. The presence of nonces and capability checks also indicates an awareness of security best practices.
However, the code analysis highlights some areas of concern. Half of the SQL queries are not using prepared statements, which could lead to SQL injection vulnerabilities if not handled carefully in specific contexts. A significant portion of output is also not properly escaped (47%), posing a risk of cross-site scripting (XSS) attacks. The taint analysis, while showing no critical or high severity flows, did identify two flows with unsanitized paths, which warrants further investigation for potential vulnerabilities.
The vulnerability history shows a single high-severity CVE related to the exposure of sensitive information. While this vulnerability is reported as currently unpatched, the fact that the last vulnerability was in 2013 suggests a period of relative security since then. However, the presence of a past high-severity vulnerability, particularly related to information exposure, underscores the importance of ongoing vigilance and thorough auditing for any plugin.
Key Concerns
- SQL queries not using prepared statements (50%)
- Output not properly escaped (47%)
- Taint analysis found unsanitized paths (2 flows)
- Past high severity vulnerability (Exposure of Sensitive Info)
Exploit Scanner Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Exploit Scanner <= 1.3.3 - Full Path Disclosure
Exploit Scanner Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Exploit Scanner Attack Surface
AJAX Handlers 3
WordPress Hooks 3
Maintenance & Trust
Exploit Scanner Maintenance & Trust
Maintenance Signals
Community Trust
Exploit Scanner Alternatives
Injection Guard
injection-guard
This plugin blocks all unauthorized and irrelevant requests through query strings and provides extended session tracking and capability audit.
Exploit Scanner for Active Theme
exploit-scanner-for-active-theme
Detects whether your theme files have fallen victim to malicious hackers.
Guard
guard
Guard protects your wp-admin against bruteforce attacks.
Kratos Anti Spam
kratos-anti-spam
Stop SPAM! Stop HAKING! No annoying CAPTCHA for your users! As simple as that!
AbyssGuard
abyssguard
WordPress security plugin protecting from vulnerabilities, zero-day attacks, harvesters, spam, and hacking attempts.
Exploit Scanner Developer Profile
12 plugins · 32K total installs
How We Detect Exploit Scanner
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/exploit-scanner/exploit-scanner.js/wp-content/plugins/exploit-scanner/exploit-scanner.jsexploit-scanner/exploit-scanner.js?ver=HTML / DOM Fingerprints
skipped-fileexploitscanner_nonceexploitscanner_file_scanexploitscanner_db_scan/wp-json/exploit-scanner/