Run Log Security & Risk Analysis

wordpress.org/plugins/run-log

Add running diary capabilities - log your sport activities, track and display: distance, duration, gear (e.g. shoes), elevation gain, calories, etc.

30 active installs v1.7.12 PHP + WP 4.0+ Updated Feb 7, 2026
run-diaryrunningsportstravatraining-log
99
A · Safe
CVEs total1
Unpatched0
Last CVESep 10, 2025
Safety Verdict

Is Run Log Safe to Use in 2026?

Generally Safe

Score 99/100

Run Log has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Sep 10, 2025Updated 1mo ago
Risk Assessment

The 'run-log' plugin v1.7.12 exhibits a generally positive security posture, largely due to its adherence to secure coding practices like using prepared statements for all SQL queries and implementing nonce and capability checks. The limited attack surface, with only one shortcode and no AJAX handlers or REST API routes exposed without authentication, further contributes to its security. The complete absence of critical or high severity taint flows and dangerous functions is also commendable, indicating a low risk of direct code execution vulnerabilities.

However, the static analysis reveals a notable concern regarding output escaping, with only 60% of outputs being properly escaped. This leaves a significant portion of the plugin's output potentially vulnerable to Cross-Site Scripting (XSS) attacks, especially if user-supplied data is not adequately sanitized before being displayed. The plugin's vulnerability history, while currently showing no unpatched CVEs, does include a past medium severity Cross-Site Request Forgery (CSRF) vulnerability. This indicates that while the developers are responsive to patching, the potential for such vulnerabilities to exist or re-emerge should not be entirely dismissed.

In conclusion, 'run-log' v1.7.12 demonstrates a solid foundation in secure development with its robust SQL handling and authentication checks. The primary weakness lies in the incomplete output escaping, which presents a tangible XSS risk. The past CSRF vulnerability also warrants attention. Addressing the output escaping issues should be the highest priority to further strengthen the plugin's security.

Key Concerns

  • Incomplete output escaping
  • Past medium severity CSRF vulnerability
Vulnerabilities
1

Run Log Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-9627medium · 4.3Cross-Site Request Forgery (CSRF)

Run Log <= 1.7.10 - Cross-Site Request Forgery to Settings Update

Sep 10, 2025 Patched in 1.7.11 (41d)
Code Analysis
Analyzed Mar 16, 2026

Run Log Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
49
73 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

60% escaped122 total outputs
Attack Surface

Run Log Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[oirl_total] run-log.php:1069
WordPress Hooks 16
actionupgrader_process_completerun-log.php:69
actionplugins_loadedrun-log.php:79
actioninitrun-log.php:125
actionadmin_menurun-log.php:137
actionadd_meta_boxesrun-log.php:318
actionadmin_enqueue_scriptsrun-log.php:417
actionsave_postrun-log.php:504
filterthe_contentrun-log.php:623
filterget_the_excerptrun-log.php:637
filterget_the_archive_descriptionrun-log.php:659
filterget_the_archive_descriptionrun-log.php:684
actionwp_enqueue_scriptsrun-log.php:695
actionwidgets_initrun-log.php:833
filterpre_get_postsrun-log.php:1095
actioninitrun-log.php:1140
actioninitrun-log.php:1186
Maintenance & Trust

Run Log Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 7, 2026
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Run Log Developer Profile

monetizemore

7 plugins · 198K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
215 days
View full developer profile
Detection Fingerprints

How We Detect Run Log

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/run-log/css/run-log.css/wp-content/plugins/run-log/js/run-log.js
Script Paths
/wp-content/plugins/run-log/js/run-log.js
Version Parameters
run-log/css/run-log.css?ver=run-log/js/run-log.js?ver=

HTML / DOM Fingerprints

CSS Classes
oirl-run-log-entryoirl-run-log-titleoirl-run-log-dateoirl-run-log-distanceoirl-run-log-paceoirl-run-log-gearoirl-run-log-goaloirl-run-log-excerpt
Data Attributes
data-oirl-options
JS Globals
runLogOptions
FAQ

Frequently Asked Questions about Run Log