hiWeb Memory Usage Security & Risk Analysis

wordpress.org/plugins/hiweb-memory-usage

A small plug on the measurement of memory used on the site is the site PHP level. Небольшой плагин, замеряющий использованный объем памяти текущей стр …

10 active installs v1.3.0.0 PHP + WP 3.0+ Updated Oct 8, 2016
checkmemoryramtestusage
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is hiWeb Memory Usage Safe to Use in 2026?

Generally Safe

Score 85/100

hiWeb Memory Usage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "hiweb-memory-usage" v1.3.0.0 plugin exhibits a generally strong security posture based on the static analysis provided. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code shows no indication of dangerous functions, file operations, external HTTP requests, or vulnerabilities found through taint analysis. The use of prepared statements for all SQL queries is a positive indicator of secure database interaction.

However, a critical concern is the complete lack of output escaping. This means that any data outputted by the plugin, if it were to handle user-provided input or dynamic content, could be vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce and capability checks also means that if any entry points were introduced in the future, they would likely be unprotected. The plugin also has no recorded vulnerability history, which is a good sign, but this doesn't negate the immediate risks identified in the static analysis.

In conclusion, while the plugin currently has a minimal attack surface and good practices in areas like SQL querying, the lack of output escaping presents a significant potential risk for XSS vulnerabilities. The absence of capability and nonce checks, while not an immediate issue due to zero entry points, represents a weakness that would need addressing if the plugin were to be expanded.

Key Concerns

  • 100% of outputs are unescaped
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

hiWeb Memory Usage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

hiWeb Memory Usage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

hiWeb Memory Usage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionshutdownhiweb-memoryusage.php:53
Maintenance & Trust

hiWeb Memory Usage Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedOct 8, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

hiWeb Memory Usage Developer Profile

Den Media

9 plugins · 100 total installs

82
trust score
Avg Security Score
83/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect hiWeb Memory Usage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<div style="position: fixed; top: 20px; padding: 10px; background: #ffffff; right: 10px; border: 3px solid black; z-index: 10000;">Size: / </div>
FAQ

Frequently Asked Questions about hiWeb Memory Usage