Debug User/Post/Options Meta Data Security & Risk Analysis

wordpress.org/plugins/fm-debug-meta-data

Debug User/Post/Options Meta Data plugin lets administrators debug users and posts meta data in a friendly view.

10 active installs v1.0.0 PHP + WP 4.0+ Updated Aug 26, 2016
debug-meta-postsusersoptions-datadebuggingdevelopers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Debug User/Post/Options Meta Data Safe to Use in 2026?

Generally Safe

Score 85/100

Debug User/Post/Options Meta Data has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The fm-debug-meta-data plugin, version 1.0.0, presents significant security concerns despite its clean vulnerability history. The static analysis reveals a concerning lack of security best practices, most notably the presence of an unprotected AJAX handler. This handler is a direct entry point into the plugin's functionality that lacks any authentication or authorization checks, making it a prime target for attackers. Furthermore, the use of the `unserialize` function without proper validation is a critical vulnerability, as it can lead to remote code execution if an attacker can control the data being unserialized. The output escaping is also completely absent, meaning any data displayed back to the user is vulnerable to cross-site scripting (XSS) attacks. While the plugin uses prepared statements for its SQL queries and has no recorded CVEs, these positive aspects are heavily outweighed by the critical security flaws identified in the code analysis. The absence of known vulnerabilities could be due to the plugin's obscurity or a lack of thorough security auditing in the past, rather than inherent security strength.

Key Concerns

  • Unprotected AJAX handler
  • Use of unserialize function
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Debug User/Post/Options Meta Data Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Debug User/Post/Options Meta Data Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$unserialized_data = @unserialize($val);fm-debug-meta-data.php:78

Output Escaping

0% escaped2 total outputs
Attack Surface
1 unprotected

Debug User/Post/Options Meta Data Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_get_meta_datafm-debug-meta-data.php:25
WordPress Hooks 2
actionadmin_menufm-debug-meta-data.php:24
actionadmin_enqueue_scriptsfm-debug-meta-data.php:27
Maintenance & Trust

Debug User/Post/Options Meta Data Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedAug 26, 2016
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Debug User/Post/Options Meta Data Developer Profile

franmc

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug User/Post/Options Meta Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fm-debug-meta-data/css/jquery-ui.min.css/wp-content/plugins/fm-debug-meta-data/css/style.css/wp-content/plugins/fm-debug-meta-data/js/custom.js
Script Paths
/wp-content/plugins/fm-debug-meta-data/js/custom.js
Version Parameters
fm-debug-custom?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
folder-treemeta-data-valuekey-treeval-treecss-treeviewdm-main-keydm-main-valexpand-group
Data Attributes
id="item-for="item-for="expand-id="expand-class="expand"
JS Globals
jquery-ui-tabs
FAQ

Frequently Asked Questions about Debug User/Post/Options Meta Data