Server Monitor Security & Risk Analysis

wordpress.org/plugins/server-monitor

Adds three simple widgets to your WordPress Dashboard displaying fundamental info about your server and installation.

100 active installs v0.2.1 PHP + WP 3.5+ Updated Dec 20, 2014
administrationmonitoringserverserver-monitorserver-monitoring
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Server Monitor Safe to Use in 2026?

Generally Safe

Score 85/100

Server Monitor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'server-monitor' v0.2.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and having no recorded vulnerabilities (CVEs) or detected taint flows. This suggests a generally careful development approach and a lack of publicly known exploitable flaws. The absence of shortcodes, cron events, and exposed AJAX/REST API endpoints also limits the overall attack surface.

However, significant concerns arise from the static analysis. The presence of the 'exec' function, a notoriously dangerous function, without any apparent safeguards like nonce checks or capability checks is a major red flag. Furthermore, only 29% of output is properly escaped, indicating a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce and capability checks across all entry points, combined with the use of 'exec', creates a scenario where an attacker could potentially execute arbitrary commands on the server if they can trigger the code containing 'exec'.

While the plugin has a clean vulnerability history and utilizes prepared statements, the identified issues with 'exec' and output escaping present immediate and critical security risks. The lack of protective measures around these risky code constructs outweighs the positive aspects. A balanced conclusion is that while the plugin has avoided known vulnerabilities and implements secure data handling for SQL, its failure to properly secure critical functions like 'exec' and sanitize output leaves it highly susceptible to exploitation.

Key Concerns

  • Dangerous function 'exec' without auth checks
  • Low output escaping (29% proper)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Server Monitor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Server Monitor Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
21 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

exec$uptime = exec('uptime');classes\class-server-monitor.php:223
exec$data['name'] = trim(exec('hostname'));classes\class-server-monitor.php:332

SQL Query Safety

100% prepared21 total queries

Output Escaping

29% escaped7 total outputs
Attack Surface

Server Monitor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedclasses\class-server-monitor.php:58
actionwp_dashboard_setupclasses\class-server-monitor.php:61
actionadmin_headclasses\class-server-monitor.php:64
Maintenance & Trust

Server Monitor Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 20, 2014
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings5
Active installs100
Developer Profile

Server Monitor Developer Profile

vendocrat

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Server Monitor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
E fatto!
FAQ

Frequently Asked Questions about Server Monitor