LW MWP Tools Security & Risk Analysis

wordpress.org/plugins/lw-mwp-tools

View resource usage, access and error logs, and more on the Liquid Web Managed WordPress Hosting Platform.

10 active installs v0.3.6.1 PHP + WP 3.4+ Updated May 18, 2018
debugliquid-webliquidwebmonitorserver-info
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LW MWP Tools Safe to Use in 2026?

Generally Safe

Score 85/100

LW MWP Tools has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "lw-mwp-tools" plugin version 0.3.6.1 presents a mixed security posture. On the positive side, it demonstrates good practices by not having any known CVEs, dangerous functions, or external HTTP requests. All SQL queries are also properly prepared, and there are no bundled libraries to worry about potentially being outdated.

However, significant security concerns arise from the static analysis. The plugin has a single entry point via an AJAX handler that lacks any authentication checks, exposing it to unauthorized access. Furthermore, the taint analysis reveals two flows with unsanitized paths, indicating potential vulnerabilities related to how user-supplied data is handled, even though they are not classified as critical or high severity. The limited output escaping (12%) also suggests a risk of cross-site scripting (XSS) vulnerabilities if user-controlled data is directly outputted without proper sanitization.

Given the absence of vulnerability history, it's difficult to draw long-term trends, but the current code analysis highlights specific, actionable risks. The lack of authentication on the AJAX handler and the unsanitized paths are the most pressing issues. While the plugin avoids common pitfalls like raw SQL and known CVEs, the identified weaknesses could still be exploited, necessitating careful remediation.

Key Concerns

  • AJAX handler without auth check
  • Flows with unsanitized paths
  • Low percentage of properly escaped output
  • No nonce checks on AJAX
  • No capability checks
Vulnerabilities
None known

LW MWP Tools Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LW MWP Tools Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
0
Bundled Libraries
0

Output Escaping

12% escaped25 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
lw_mwp_tools_info (lw-mwp-tools.php:62)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

LW MWP Tools Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_lwmwptools_monitorajaxlw-mwp-tools.php:39
WordPress Hooks 2
actionadmin_menulw-mwp-tools.php:38
actionadmin_initlw-mwp-tools.php:50
Maintenance & Trust

LW MWP Tools Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedMay 18, 2018
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

LW MWP Tools Developer Profile

Francis Smith

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LW MWP Tools

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lw-mwp-tools/css/chartist.min.css/wp-content/plugins/lw-mwp-tools/css/monitor.css/wp-content/plugins/lw-mwp-tools/js/chartist.min.js/wp-content/plugins/lw-mwp-tools/js/smoothie.min.js/wp-content/plugins/lw-mwp-tools/js/monitor.js

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
data-chartist
JS Globals
Chartistsmoothie
FAQ

Frequently Asked Questions about LW MWP Tools