Relevanssi Dashboard Security & Risk Analysis

wordpress.org/plugins/relevanssi-dashboard

Dashboard Widgets for Relevanssi Search data. Of course requires the wonderful Relevanssi plugin too.

40 active installs v0.0.1 PHP + WP 2.8+ Updated Unknown
dashboardrelevanssiwidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Relevanssi Dashboard Safe to Use in 2026?

Generally Safe

Score 100/100

Relevanssi Dashboard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The relevanssi-dashboard v0.0.1 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events suggests a limited attack surface. Furthermore, the lack of dangerous functions, file operations, and external HTTP requests further bolsters its security. The taint analysis showing zero flows with unsanitized paths is also a positive indicator.

However, there are areas of concern that prevent a completely favorable assessment. The presence of a single SQL query that does not utilize prepared statements is a notable weakness. Coupled with a low rate of proper output escaping (33%), this creates potential for vulnerabilities like SQL injection or cross-site scripting (XSS) if user-supplied data is involved in these operations without proper sanitization and escaping. The complete lack of capability checks and nonce checks, while not directly exploitable due to the limited entry points, represents a departure from best practices and could become a security risk if functionality is ever added.

The plugin's vulnerability history is pristine, with no recorded CVEs. This suggests a history of secure development or a lack of targeted discovery efforts. While encouraging, it's crucial to remember that a clean history does not guarantee future security. The combination of the existing SQL query issue, low output escaping, and missing checks points to potential vulnerabilities that might not have been discovered or exploited yet.

Key Concerns

  • SQL query without prepared statements
  • Low output escaping rate
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Relevanssi Dashboard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Relevanssi Dashboard Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

33% escaped3 total outputs
Attack Surface

Relevanssi Dashboard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_dashboard_setuprelevanssi_dashboard.php:53
Maintenance & Trust

Relevanssi Dashboard Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Relevanssi Dashboard Developer Profile

toddhalfpenny

9 plugins · 21K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
371 days
View full developer profile
Detection Fingerprints

How We Detect Relevanssi Dashboard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widefat
Shortcode Output
<table class='widefat'><tbody><tr><th>Query</th><th>#</th><th>Hits</th></tr>
FAQ

Frequently Asked Questions about Relevanssi Dashboard