MySQLi database layer Security & Risk Analysis

wordpress.org/plugins/mysqli

MySQL_* functions are deprecated and this plugin creates a layer to use MySQLi instead. So you don't get notices when using PHP 5.5

100 active installs v1.1 PHP + WP 3.6+ Updated Sep 18, 2013
backenddatabase
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MySQLi database layer Safe to Use in 2026?

Generally Safe

Score 85/100

MySQLi database layer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "mysqli" v1.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detectable attack surface points, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly reduces the potential for external exploitation. Furthermore, the code demonstrates good practices by utilizing prepared statements for all its SQL queries and implementing nonce checks and capability checks, which are crucial for preventing common WordPress vulnerabilities. The plugin also avoids external HTTP requests and has no known vulnerability history, further contributing to its secure profile. The only area of concern identified is the output escaping, where only 10% of outputs are properly escaped. This suggests a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-controlled data is outputted without adequate sanitization. Despite this, the overall security assessment is positive due to the lack of critical code signals, taint flows, and historical vulnerabilities.

Key Concerns

  • Output escaping is poorly implemented
Vulnerabilities
None known

MySQLi database layer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

MySQLi database layer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
9
1 escaped
Nonce Checks
2
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

10% escaped10 total outputs
Attack Surface

MySQLi database layer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuwp-mysqli.php:18
Maintenance & Trust

MySQLi database layer Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 18, 2013
PHP min version
Downloads17K

Community Trust

Rating94/100
Number of ratings13
Active installs100
Developer Profile

MySQLi database layer Developer Profile

Marko Heijnen

9 plugins · 870 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MySQLi database layer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wraptool-boxtitle
Data Attributes
id="install-db-php"
FAQ

Frequently Asked Questions about MySQLi database layer