MySQL Profiler Security & Risk Analysis

wordpress.org/plugins/mysql-profiler

Displays a list of each page's SQL queries and the functions calling them that can be searched and sorted by time, type, etc.

10 active installs v1.0 PHP + WP 2.9+ Updated Mar 6, 2012
debugdebuggingmysqlprofilerprofiling
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MySQL Profiler Safe to Use in 2026?

Generally Safe

Score 85/100

MySQL Profiler has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "mysql-profiler" plugin v1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified dangerous functions, file operations, external HTTP requests, or SQL queries not using prepared statements is highly commendable. Furthermore, all identified outputs are properly escaped. The attack surface appears to be zero, with no AJAX handlers, REST API routes, shortcodes, or cron events found. This indicates a deliberate effort to minimize potential entry points for malicious actors.

However, a significant concern arises from the complete lack of nonce and capability checks. While the attack surface is reported as zero, this means that any future additions or unforeseen interactions could potentially be exploited if proper authentication and authorization mechanisms are not implemented. The presence of the outdated DataTables v1.9.0 library also poses a potential risk, as older versions of libraries can contain known vulnerabilities that may not have been discovered or disclosed as CVEs in the plugin's history. The plugin's vulnerability history being completely clean is a positive sign, but it's crucial to remember that a lack of discovered vulnerabilities does not guarantee future safety, especially when outdated dependencies are present.

In conclusion, "mysql-profiler" v1.0 has excellent foundational security practices in place, particularly regarding direct code execution and data handling. The primary weaknesses lie in the absence of essential security checks (nonces and capabilities) and the use of an outdated bundled library. Addressing these two areas would significantly bolster the plugin's security, moving it from a strong candidate to a robustly secured plugin.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Bundled outdated library: DataTables v1.9.0
Vulnerabilities
None known

MySQL Profiler Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MySQL Profiler Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

DataTables1.9.0
Attack Surface

MySQL Profiler Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

MySQL Profiler Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMar 6, 2012
PHP min version
Downloads7K

Community Trust

Rating84/100
Number of ratings5
Active installs10
Developer Profile

MySQL Profiler Developer Profile

tombenner

5 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MySQL Profiler

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mysql-profiler/css/style.css/wp-content/plugins/mysql-profiler/js/mysql-profiler.js
Script Paths
/wp-content/plugins/mysql-profiler/js/mysql-profiler.js
Version Parameters
mysql-profiler/css/style.css?ver=mysql-profiler/js/mysql-profiler.js?ver=

HTML / DOM Fingerprints

JS Globals
MysqlProfilermysqlProfiler
FAQ

Frequently Asked Questions about MySQL Profiler