
Log HTTP Requests Security & Risk Analysis
wordpress.org/plugins/log-http-requestsLog and view all WP HTTP requests
Is Log HTTP Requests Safe to Use in 2026?
Generally Safe
Score 100/100Log HTTP Requests has a strong security track record. Known vulnerabilities have been patched promptly.
The 'log-http-requests' plugin version 1.5.0 presents a mixed security posture. On the positive side, it demonstrates good practices by avoiding dangerous functions, file operations, and external HTTP requests. The majority of its SQL queries are prepared, and a reasonable percentage of output is properly escaped. However, significant concerns arise from its attack surface. The plugin exposes two AJAX handlers, both of which lack authentication checks, creating a direct pathway for unauthorized access and potential manipulation. This is further exacerbated by a taint analysis revealing a flow with unsanitized paths, specifically flagged as high severity. While there are no currently unpatched CVEs, the plugin has a history of medium severity vulnerabilities, including Cross-Site Scripting, indicating past issues with input sanitization or output escaping that require ongoing vigilance.
The primary risks stem from the unprotected AJAX endpoints and the identified unsanitized path flow. The lack of authentication on AJAX handlers makes them prime targets for attackers to exploit or manipulate. The high-severity taint flow suggests a potential for sensitive data exposure or code execution if the unsanitized input is not handled correctly within the plugin's logic. Despite the absence of critical or high severity known vulnerabilities, the presence of past medium vulnerabilities and the current code analysis findings warrant careful consideration. The plugin has strengths in its avoidance of certain risky coding practices, but the unprotected entry points and the identified unsanitized data flow significantly diminish its overall security. Users should exercise caution and ensure they have robust security measures in place if they choose to use this plugin.
Key Concerns
- 2 AJAX handlers without auth checks
- Taint flow with unsanitized paths (high severity)
- 62% of output properly escaped (implies 38% not)
- 1 cron event without explicit auth check mentioned
Log HTTP Requests Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Log HTTP Requests <= 1.3.1 - Stored Cross-Site Scripting
Log HTTP Requests Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Log HTTP Requests Attack Surface
AJAX Handlers 2
WordPress Hooks 6
Scheduled Events 1
Maintenance & Trust
Log HTTP Requests Maintenance & Trust
Maintenance Signals
Community Trust
Log HTTP Requests Alternatives
Inspect HTTP Requests
inspect-http-requests
Log, view, and Block WP HTTP requests
Meta for WooCommerce
facebook-for-woocommerce
Get the Official Meta for WooCommerce plugin for powerful ways to help grow your business.
Site Mailer – SMTP Replacement, Email API Deliverability & Email Log
site-mailer
Effortlessly manage transactional emails with Site Mailer. High deliverability, logs and statistics, and no SMTP plugins needed.
Simple JWT Login – Allows you to use JWT on REST endpoints.
simple-jwt-login
Enhance the WordPress REST API with JWT authentication for secure access by mobile apps, external sites, and third-party services.
HTTP Requests Manager
http-requests-manager
Limit, Debug, Optimize WP_HTTP requests. Limit by request count, page load time, reduce timeout for each request. Speed up login and admin pages.
Log HTTP Requests Developer Profile
1 plugin · 2K total installs
How We Detect Log HTTP Requests
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/log-http-requests/assets/css/admin.css/wp-content/plugins/log-http-requests/assets/js/admin.js/wp-content/plugins/log-http-requests/assets/js/admin.jslog-http-requests/assets/css/admin.css?ver=log-http-requests/assets/js/admin.js?ver=HTML / DOM Fingerprints
LHR