FDP Debug Security & Risk Analysis

wordpress.org/plugins/fdp-debug

It adds an action button to collect information to debug Freesoul Deactivate Plugins. If you don't use Freesoul Deactivate Plugins you don't …

10 active installs v0.0.6 PHP 5.6+ WP 4.6+ Updated Dec 10, 2025
debugfreesoul-deactivate-plugins
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is FDP Debug Safe to Use in 2026?

Generally Safe

Score 100/100

FDP Debug has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "fdp-debug" plugin v0.0.6 exhibits a generally strong security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, with no entry points identified as unprotected. Furthermore, the code signals indicate a lack of dangerous functions, file operations, and external HTTP requests. The use of prepared statements for all SQL queries is a positive practice. However, a notable concern is the relatively low percentage (57%) of properly escaped output, which leaves room for potential cross-site scripting (XSS) vulnerabilities.

The taint analysis also shows no critical or high severity flows with unsanitized paths, suggesting that data input is not being mishandled in ways that could lead to severe exploits. The plugin's vulnerability history is clear, with no known CVEs recorded, indicating a lack of past security incidents. This, combined with the absence of critical findings in the static analysis, points to a plugin that, at this version, has been developed with security in mind, particularly in avoiding common vulnerable patterns like raw SQL or exposed entry points.

While the plugin demonstrates strengths in limiting its attack surface and secure data handling for SQL, the moderate output escaping rate represents a potential weakness that could be exploited. The lack of recorded vulnerabilities is encouraging, but it's crucial to maintain vigilance. Future versions should aim to improve output escaping to a higher standard to mitigate XSS risks, and continued monitoring for any emerging vulnerabilities is recommended.

Key Concerns

  • Moderate output escaping rate
Vulnerabilities
None known

FDP Debug Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

FDP Debug Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
32
43 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped75 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
eos_dp_debug_print_disabled_plugins (fdp-debug.php:29)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

FDP Debug Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_footerfdp-debug.php:27
actioneos_dp_action_buttonsfdp-debug.php:336
Maintenance & Trust

FDP Debug Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 10, 2025
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

FDP Debug Developer Profile

Jose Mortellaro

56 plugins · 26K total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
62 days
View full developer profile
Detection Fingerprints

How We Detect FDP Debug

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fdp-debug/css/fdp-debug.css/wp-content/plugins/fdp-debug/js/fdp-debug.js
Script Paths
/wp-content/plugins/fdp-debug/js/fdp-debug.js
Version Parameters
fdp-debug/css/fdp-debug.css?ver=fdp-debug/js/fdp-debug.js?ver=

HTML / DOM Fingerprints

JS Globals
eos_dp_debug_print_disabled_pluginseos_dp_get_option
FAQ

Frequently Asked Questions about FDP Debug