LogPress Security & Risk Analysis

wordpress.org/plugins/logpress

Keeps a short history of access logs.

10 active installs v1.0.0 PHP 5.2.7+ WP 4.9.8+ Updated Oct 12, 2018
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LogPress Safe to Use in 2026?

Generally Safe

Score 85/100

LogPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The static analysis of LogPress v1.0.0 reveals a generally strong security posture, with no identified dangerous functions, file operations, or external HTTP requests. The plugin also demonstrates good practice by using prepared statements for its single SQL query. Furthermore, the lack of reported CVEs and a clean vulnerability history suggest a developer who is either very diligent about security or has not historically been a target for significant vulnerabilities. The absence of any identified taint flows is also a positive indicator, meaning there are no immediately apparent pathways for malicious data to be processed without proper sanitization.

However, there are notable concerns that temper this positive outlook. The complete lack of nonce and capability checks across all entry points, including the zero unprotected AJAX handlers, REST API routes, and shortcodes, represents a significant weakness. While the current entry points are zero, if any are introduced in the future without these critical security measures, it would leave the plugin vulnerable to various attacks. Additionally, the fact that 100% of the four identified output instances are not properly escaped is a serious concern. This deficiency could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever rendered directly into the output without sanitization.

In conclusion, LogPress v1.0.0 benefits from a lack of known vulnerabilities and responsible SQL handling. Nevertheless, the complete absence of authorization checks and the widespread issue of unescaped output create significant potential security risks. Future development must prioritize the implementation of proper nonce and capability checks for all entry points and ensure rigorous output escaping to mitigate these identified weaknesses.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
  • Unescaped output found (4/4 instances)
Vulnerabilities
None known

LogPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

LogPress Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

LogPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped4 total outputs
Attack Surface

LogPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menulogpress.php:64
actioninitlogpress.php:65
Maintenance & Trust

LogPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedOct 12, 2018
PHP min version5.2.7
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Alternatives

LogPress Alternatives

No alternatives data available yet.

Developer Profile

LogPress Developer Profile

Bimal Poudel

13 plugins · 840 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LogPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about LogPress