MWR Hit Counter Security & Risk Analysis

wordpress.org/plugins/mwr-hit-counter

MWR Hit Counter is a simple and lightweight text-based counter for your website.

100 active installs v1.1.0 PHP 7.4+ WP 5.0+ Updated Sep 16, 2025
hit-counterpage-counterpage-view-countpage-visitwordpress-page-view
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MWR Hit Counter Safe to Use in 2026?

Generally Safe

Score 100/100

MWR Hit Counter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The mwr-hit-counter plugin v1.1.0 presents a generally good security posture with several positive indicators. The static analysis reveals no direct vulnerabilities in terms of dangerous functions, file operations, or external HTTP requests. Crucially, all identified output is properly escaped, and there are no critical or high-severity taint flows detected. The plugin also has no recorded vulnerability history, which suggests a history of secure development practices.

However, there are significant areas of concern that introduce risk. The plugin's handling of SQL queries is a major red flag, with all three queries being executed without the use of prepared statements. This leaves the plugin susceptible to SQL injection vulnerabilities. Furthermore, the absence of nonce checks and capability checks, especially given the presence of a shortcode which is an entry point, indicates a lack of robust authentication and authorization mechanisms. While the attack surface is currently small and appears to have no unprotected entry points based on the provided data, the lack of these fundamental security controls means that if any new entry points are introduced or existing ones are modified, they could easily become vulnerable.

In conclusion, while mwr-hit-counter v1.1.0 benefits from a clean vulnerability history and proper output escaping, the unaddressed risks associated with raw SQL queries and the absence of nonces and capability checks are serious oversights. These issues significantly increase the plugin's vulnerability to common web attacks, despite the current lack of reported CVEs.

Key Concerns

  • Raw SQL queries without prepared statements
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

MWR Hit Counter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

MWR Hit Counter Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

100% escaped2 total outputs
Attack Surface

MWR Hit Counter Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[mwrcounter] index.php:53
WordPress Hooks 1
actioninitindex.php:63
Maintenance & Trust

MWR Hit Counter Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedSep 16, 2025
PHP min version7.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

MWR Hit Counter Developer Profile

Daniel Martín

1 plugin · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MWR Hit Counter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
mwrcounter
FAQ

Frequently Asked Questions about MWR Hit Counter