Server Status Security & Risk Analysis

wordpress.org/plugins/server-status

Show server information widget in Dashboard and Network Admin Dashboard.(Currently, only RHEL is tested)

70 active installs v0.1.2 PHP + WP 3.8+ Updated Aug 30, 2014
linuxload-averageserverstatusuptime
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Server Status Safe to Use in 2026?

Generally Safe

Score 85/100

Server Status has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "server-status" plugin, in version 0.1.2, presents a mixed security posture. On one hand, it boasts a seemingly small attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events exposed. This lack of direct entry points is a positive sign for preventing common web attack vectors.

However, significant concerns arise from the code analysis. The presence of dangerous functions like `shell_exec` and `exec`, coupled with a complete absence of capability checks and nonce checks, indicates a high risk of remote code execution or privilege escalation if any of these functions are ever exposed to user input, even indirectly. The single SQL query is also not using prepared statements, which is a minor risk but still a deviation from best practices. The low percentage of properly escaped output is another area of concern, potentially leading to cross-site scripting vulnerabilities.

The plugin's vulnerability history is notably clean, with no recorded CVEs. This could indicate either a well-written plugin or simply a lack of historical scrutiny. While the absence of past vulnerabilities is encouraging, it doesn't negate the significant risks identified in the static analysis, particularly the dangerous function usage without any apparent security controls. The taint analysis, while showing no critical or high severity flows, did reveal two unsanitized paths, suggesting that internal data handling might still be susceptible to manipulation.

Key Concerns

  • Dangerous functions (shell_exec, exec) without auth/checks
  • SQL query without prepared statements
  • Low percentage of properly escaped output
  • No capability checks
  • No nonce checks
  • Taint flows with unsanitized paths
Vulnerabilities
None known

Server Status Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Server Status Code Analysis

Dangerous Functions
18
Raw SQL Queries
1
0 prepared
Unescaped Output
11
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

shell_exec$data['uptime'] = @shell_exec('uptime 2>&1');server-status.php:40
shell_exec$data['proc']['uptime'] = @shell_exec('cat /proc/uptime 2>&1');server-status.php:41
shell_exec$data['proc']['loadavg'] = @shell_exec('cat /proc/loadavg 2>&1');server-status.php:42
shell_exec$data['w'] = @shell_exec('w 2>&1');server-status.php:43
shell_exec$data['w_hs'] = @shell_exec('w -hs 2>&1');server-status.php:44
shell_exec$data['who'] = @shell_exec('who 2>&1');server-status.php:45
shell_exec$data['who_am_i'] = @shell_exec('who am i 2>&1');server-status.php:46
shell_exec$data['whoami'] = @shell_exec('whoami 2>&1');server-status.php:47
shell_exec$data['id_un'] = @shell_exec('id -un 2>&1');server-status.php:48
shell_exec$data['users'] = @shell_exec('users 2>&1');server-status.php:49
shell_exec$data['uname'] = @shell_exec('uname 2>&1');server-status.php:50
shell_exec$data['uname_a'] = @shell_exec('uname -a 2>&1');server-status.php:51
exec$this->data['uptime'] = @exec('cat /proc/uptime');server-status.php:285
exec$this->data['users'] = @exec('users');server-status.php:297
exec$this->data['loadavg'] = @exec('cat /proc/loadavg');server-status.php:304
exec$this->data['boottime'] = @exec('sysctl kern.boottime');server-status.php:326
exec$this->data['users'] = @exec('users');server-status.php:341
exec$this->data['loadavg'] = @exec('sysctl vm.loadavg');server-status.php:348

SQL Query Safety

0% prepared1 total queries

Output Escaping

8% escaped12 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
display (server-status.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Server Status Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_dashboard_setupserver-status.php:14
actionwp_network_dashboard_setupserver-status.php:16
actionfetchserver-status.php:176
actionfetchserver-status.php:177
actionfetchserver-status.php:178
Maintenance & Trust

Server Status Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedAug 30, 2014
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs70
Developer Profile

Server Status Developer Profile

Daisuke Takahashi

6 plugins · 270 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Server Status

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p>Thank you for using <span style="font-style:italic !important;">WP Server Status</span> plugin!</p>
FAQ

Frequently Asked Questions about Server Status