Log HTTP Requests Security & Risk Analysis

wordpress.org/plugins/log-http-requests

Log and view all WP HTTP requests

2K active installs v1.5.0 PHP + WP 5.0+ Updated Nov 11, 2025
apilogrequestsupdate-checkswp_http
100
A · Safe
CVEs total1
Unpatched0
Last CVEOct 5, 2022
Download
Safety Verdict

Is Log HTTP Requests Safe to Use in 2026?

Generally Safe

Score 100/100

Log HTTP Requests has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 5, 2022Updated 4mo ago
Risk Assessment

The 'log-http-requests' plugin version 1.5.0 presents a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, file operations, and external HTTP requests. The majority of its SQL queries are prepared, and a reasonable percentage of output is properly escaped. However, significant concerns arise from its attack surface. The plugin exposes two AJAX handlers, both of which lack authentication checks, creating a direct pathway for unauthorized access and potential manipulation. This is further exacerbated by a taint analysis revealing a flow with unsanitized paths, specifically flagged as high severity. While there are no currently unpatched CVEs, the plugin has a history of medium severity vulnerabilities, including Cross-Site Scripting, indicating past issues with input sanitization or output escaping that require ongoing vigilance.

The primary risks stem from the unprotected AJAX endpoints and the identified unsanitized path flow. The lack of authentication on AJAX handlers makes them prime targets for attackers to exploit or manipulate. The high-severity taint flow suggests a potential for sensitive data exposure or code execution if the unsanitized input is not handled correctly within the plugin's logic. Despite the absence of critical or high severity known vulnerabilities, the presence of past medium vulnerabilities and the current code analysis findings warrant careful consideration. The plugin has strengths in its avoidance of certain risky coding practices, but the unprotected entry points and the identified unsanitized data flow significantly diminish its overall security. Users should exercise caution and ensure they have robust security measures in place if they choose to use this plugin.

Key Concerns

  • 2 AJAX handlers without auth checks
  • Taint flow with unsanitized paths (high severity)
  • 62% of output properly escaped (implies 38% not)
  • 1 cron event without explicit auth check mentioned
Vulnerabilities
1

Log HTTP Requests Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2022-3402medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Log HTTP Requests <= 1.3.1 - Stored Cross-Site Scripting

Oct 5, 2022 Patched in 1.3.2 (475d)
Code Analysis
Analyzed Mar 16, 2026

Log HTTP Requests Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
6 prepared
Unescaped Output
13
21 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

86% prepared7 total queries

Output Escaping

62% escaped34 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<log-http-requests> (log-http-requests.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Log HTTP Requests Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_lhr_querylog-http-requests.php:50
authwp_ajax_lhr_clearlog-http-requests.php:51
WordPress Hooks 6
actioninitlog-http-requests.php:44
actionadmin_menulog-http-requests.php:45
actionadmin_enqueue_scriptslog-http-requests.php:46
filterhttp_request_argslog-http-requests.php:47
actionhttp_api_debuglog-http-requests.php:48
actionlhr_cleanup_cronlog-http-requests.php:49

Scheduled Events 1

lhr_cleanup_cron
Maintenance & Trust

Log HTTP Requests Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 11, 2025
PHP min version
Downloads70K

Community Trust

Rating100/100
Number of ratings15
Active installs2K
Developer Profile

Log HTTP Requests Developer Profile

Matt Gibbs

1 plugin · 2K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
475 days
View full developer profile
Detection Fingerprints

How We Detect Log HTTP Requests

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/log-http-requests/assets/css/admin.css/wp-content/plugins/log-http-requests/assets/js/admin.js
Script Paths
/wp-content/plugins/log-http-requests/assets/js/admin.js
Version Parameters
log-http-requests/assets/css/admin.css?ver=log-http-requests/assets/js/admin.js?ver=

HTML / DOM Fingerprints

JS Globals
LHR
FAQ

Frequently Asked Questions about Log HTTP Requests