Hosting Monitor Security & Risk Analysis

wordpress.org/plugins/hosting-monitor

Track how much disk and database space WordPress is using.

30 active installs v0.7.5 PHP + WP 3.0+ Updated Apr 24, 2014
disk-spaceserver-monitorshared-hostingvisual-trackingweb-space
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hosting Monitor Safe to Use in 2026?

Generally Safe

Score 85/100

Hosting Monitor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'hosting-monitor' plugin version 0.7.5 exhibits a mixed security posture. On one hand, the plugin demonstrates strong adherence to modern WordPress security practices, with zero known CVEs, no unpatched vulnerabilities, and SQL queries exclusively using prepared statements. The presence of nonce and capability checks, alongside the absence of external HTTP requests and file operations, are positive indicators. However, the static analysis reveals significant concerns within the code itself. The use of dangerous functions like 'shell_exec' and 'create_function' is a major red flag, potentially opening the door to remote code execution if not handled with extreme caution and robust sanitization. Furthermore, a significant portion of output is not properly escaped, posing a cross-site scripting (XSS) risk. The single identified unsanitized path in the taint analysis, while not classified as critical or high, warrants attention as it represents a potential avenue for malicious input to be processed without adequate validation. The plugin's vulnerability history being entirely clean is positive, but it does not negate the risks present in the current code analysis. A balanced view suggests the plugin has avoided past exploitable issues but carries inherent risks due to its implementation of dangerous functions and insufficient output sanitization.

Key Concerns

  • Dangerous functions used (shell_exec, create_function)
  • Low percentage of properly escaped output
  • Unsanitized path identified in taint analysis
Vulnerabilities
None known

Hosting Monitor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hosting Monitor Code Analysis

Dangerous Functions
5
Raw SQL Queries
0
0 prepared
Unescaped Output
16
4 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

shell_exec$output = substr( shell_exec( 'pwd' ), 0, -9 );hosting-monitor.php:294
shell_exec$usedspace = substr( shell_exec( 'du -s ' . $output ), 0, -( strlen( $output ) + 1 ) );hosting-monitor.php:296
shell_exec$output = substr( shell_exec( 'pwd' ), 0, -9 );hosting-monitor.php:468
shell_exec$usedspace = substr( shell_exec( 'du -s ' . $output ), 0, -( strlen( $output ) + 1 ) );hosting-monitor.php:469
create_functionadd_action( 'plugins_loaded', create_function( '', '$memory = new wp_memory_usage();' ) );hosting-monitor.php:670

Output Escaping

20% escaped20 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
update_hosting_monitor_options (hosting-monitor.php:79)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Hosting Monitor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuhosting-monitor.php:43
actioninithosting-monitor.php:373
actionwp_dashboard_setuphosting-monitor.php:375
filteradmin_footer_texthosting-monitor.php:376
actionplugins_loadedhosting-monitor.php:670
Maintenance & Trust

Hosting Monitor Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 24, 2014
PHP min version
Downloads9K

Community Trust

Rating86/100
Number of ratings4
Active installs30
Developer Profile

Hosting Monitor Developer Profile

Mike Bijon

3 plugins · 940 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hosting Monitor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
TODO msb 10-24-2011: Put this & hosting_monitor() in class, de-duplicate theseMixed code, new & from Disk Space Pie Chart (DSPC)Entire method from Disk Space Pie Chart (DSPC)Send Low-on-Space Alerts:
Data Attributes
name="guru_space"name="hm_db_space"name="guru_unit"name="hm_db_unit"value="TB"selected+4 more
FAQ

Frequently Asked Questions about Hosting Monitor