LogWatch Security & Risk Analysis

wordpress.org/plugins/logwatch

Monitor and analyze PHP error logs directly from your WordPress admin panel with smart grouping, filtering, and export capabilities.

0 active installs v1.0.0 PHP 7.4+ WP 5.0+ Updated Apr 9, 2026
debuggingdeveloper-toolserror-loglog-viewerphp-errors
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LogWatch Safe to Use in 2026?

Generally Safe

Score 100/100

LogWatch has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "logwatch" plugin v1.0.0 demonstrates a strong security posture in many areas. The analysis reveals excellent adherence to modern WordPress security practices, with 100% of SQL queries utilizing prepared statements and all identified output being properly escaped. Furthermore, the plugin implements nonce and capability checks on all its identified entry points, which include AJAX handlers and REST API routes. The absence of known vulnerabilities in its history is also a significant positive indicator, suggesting a well-maintained codebase.

However, the presence of two instances of the `shell_exec` function represents a notable concern. While the static analysis did not reveal any explicit taint flows leading to dangerous function execution, `shell_exec` is inherently risky as it allows for the execution of arbitrary operating system commands. If user-supplied data is ever indirectly passed to these functions without strict sanitization, it could lead to command injection vulnerabilities. The plugin also performs 12 file operations and makes one external HTTP request, which, while not necessarily problematic on their own, could become vectors for exploitation if not carefully managed in conjunction with other code paths.

Overall, "logwatch" v1.0.0 is built on a solid foundation of security best practices, particularly regarding data handling and access control. Its clean vulnerability history further bolsters confidence. The primary area requiring attention is the use of `shell_exec`, which introduces a potential for severe impact if exploited, even if current analysis does not show an immediate risk. Developers should carefully review how these functions are used and ensure all inputs are rigorously validated and sanitized.

Key Concerns

  • Use of dangerous function shell_exec
Vulnerabilities
None known

LogWatch Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

LogWatch Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

LogWatch Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
4 prepared
Unescaped Output
0
403 escaped
Nonce Checks
6
Capability Checks
6
File Operations
12
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

shell_exec$output = shell_exec($cmd);includes/class-logwatch-reverse-reader.php:143
shell_exec$output = shell_exec($cmd);includes/class-logwatch-reverse-reader.php:162

SQL Query Safety

100% prepared4 total queries

Output Escaping

100% escaped403 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

1 flows
<logwatch-admin-settings> (admin/partials/logwatch-admin-settings.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

LogWatch Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 1

authwp_ajax_logwat_load_widgetincludes/class-logwatch-dashboard-widget.php:15

REST API Routes 2

POST/wp-json/logwatch/v1/hide-errorincludes/class-logwatch-rest-controller.php:8
POST/wp-json/logwatch/v1/unhide-errorincludes/class-logwatch-rest-controller.php:35
WordPress Hooks 12
actionwp_dashboard_setupincludes/class-logwatch-dashboard-widget.php:14
actionadmin_enqueue_scriptsincludes/class-logwatch-dashboard-widget.php:16
actioninitincludes/class-logwatch.php:27
actionadmin_menuincludes/class-logwatch.php:53
actionadmin_enqueue_scriptsincludes/class-logwatch.php:54
actionadmin_enqueue_scriptsincludes/class-logwatch.php:55
actionadmin_initincludes/class-logwatch.php:56
filterplugin_action_links_logwatch/logwatch.phpincludes/class-logwatch.php:59
actionrest_api_initincludes/class-logwatch.php:65
actionadmin_enqueue_scriptsincludes/feedback-modal/class-wp-admin-fb-modal-assets.php:30
actionadmin_enqueue_scriptsincludes/feedback-modal/class-wp-admin-fb-modal-assets.php:31
actionadmin_footerincludes/feedback-modal/class-wp-admin-fb-modal.php:51
Maintenance & Trust

LogWatch Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 9, 2026
PHP min version7.4
Downloads55

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

LogWatch Developer Profile

Pixel Solutions

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LogWatch

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/logwatch/admin/css/logwatch-admin.css/wp-content/plugins/logwatch/admin/js/logwatch-admin.js/wp-content/plugins/logwatch/assets/js/logwatch-dashboard-widget.js
Script Paths
admin/js/logwatch-admin.jsassets/js/logwatch-dashboard-widget.js
Version Parameters
logwatch-admin.css?ver=logwatch-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
logwatch-admin-logslogwatch-admin-hiddenlogwatch-admin-settingslogwatch-admin-premiumlogwatch-admin-helplogwatch-test-errorslogwat_dashboard_widget
Data Attributes
data-logwatch-sourcedata-logwatch-nonce
JS Globals
logwatchAjax
REST Endpoints
/logwatch/v1/
FAQ

Frequently Asked Questions about LogWatch