PG Monitor Security & Risk Analysis

wordpress.org/plugins/pg-monitor

A virtual target file to be read by monitoring services instead of using a static HTML page.

10 active installs v1.1.0 PHP + WP 3.2+ Updated May 25, 2019
monitoruptime
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PG Monitor Safe to Use in 2026?

Generally Safe

Score 85/100

PG Monitor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the 'pg-monitor' plugin version 1.1.0 appears to have a generally strong security posture. The absence of any attack surface points like AJAX handlers, REST API routes, shortcodes, or cron events significantly reduces the potential for external exploitation. Furthermore, the code signals indicate good practices, with no dangerous functions, no raw SQL queries (all use prepared statements), and no file operations or external HTTP requests. The absence of known CVEs and a history of vulnerabilities is also a positive indicator of the plugin's security maintenance.

However, there are areas that warrant attention. The relatively low percentage of properly escaped output (43%) presents a potential risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully before being displayed. While the taint analysis did not reveal any critical or high-severity unsanitized paths, the lack of detailed taint flow analysis (0 flows analyzed) means that this assessment is based on a limited scope and could miss certain types of injection vulnerabilities. The absence of nonce and capability checks, while not directly exploitable due to the lack of exposed entry points, suggests a potential weakness if the plugin were to evolve and introduce new functionalities without implementing proper authorization checks.

In conclusion, 'pg-monitor' v1.1.0 demonstrates a solid foundation with a minimal attack surface and good SQL handling. The primary concern lies in the insufficient output escaping, which could lead to XSS. The lack of extensive taint analysis and authorization checks on non-existent entry points are areas that could be improved for future robustness. Overall, the current risk is assessed as low, but the plugin should be monitored for updates that address output escaping and potential future entry point introductions.

Key Concerns

  • Low percentage of properly escaped output
  • Limited taint analysis scope
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

PG Monitor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PG Monitor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

43% escaped7 total outputs
Attack Surface

PG Monitor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitpg-monitor.php:15
actioninitpg-monitor.php:28
filterquery_varspg-monitor.php:34
actionparse_requestpg-monitor.php:41
actiongenerate_rewrite_rulespg-monitor.php:60
Maintenance & Trust

PG Monitor Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedMay 25, 2019
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PG Monitor Developer Profile

PeoplesGeek

3 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PG Monitor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- * This file is called by a .htaccess redirect. * It does not access any part of WordPress and so it can be seen even if the site is experiencing other issues such as database outages --><!-- * This file is called by WordPress during the parse_request action * WordPress has been initialised and so the DB and other features are operational -->
FAQ

Frequently Asked Questions about PG Monitor