Ship Log Security & Risk Analysis

wordpress.org/plugins/ship-log

Create and store profiles on all your ships/boats along with logs of every outing and adventure

10 active installs v1.3.4 PHP + WP 3.0+ Updated Jun 5, 2017
boat-logcustom-post-typemanagementshipship-log
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ship Log Safe to Use in 2026?

Generally Safe

Score 85/100

Ship Log has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "ship-log" plugin v1.3.4 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code analysis indicates a complete absence of dangerous functions and file operations. All SQL queries are properly prepared, and there are no external HTTP requests, which are all excellent security practices.

However, a notable concern is the significant percentage of improperly escaped output (41%). While the total number of output operations is high (133), a substantial portion of these do not appear to have proper escaping applied. This presents a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly outputted without sanitization. The lack of any identified nonce or capability checks, while not directly indicative of a vulnerability in itself due to the limited attack surface, suggests that if new entry points were to be introduced in the future, they might lack fundamental security controls.

The plugin also has no recorded vulnerability history, which is a positive indicator of its past security. Combined with the current lack of critical or high severity issues in the static analysis, this suggests a generally well-maintained and secure codebase. However, the unescaped output remains the primary area for improvement to further harden the plugin.

Key Concerns

  • Unescaped output detected (41%)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Ship Log Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Ship Log Release Timeline

v1.3
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Ship Log Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
55
78 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

59% escaped133 total outputs
Attack Surface

Ship Log Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Ship Log Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJun 5, 2017
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Ship Log Developer Profile

Ben Lobaugh (blobaugh)

11 plugins · 11K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ship Log

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ships-log/lib/bl/js/jquery-ui/jquery-ui.min.js/wp-content/plugins/ships-log/lib/bl/css/bl.css/wp-content/plugins/ships-log/css/ships-log.css
Script Paths
/wp-content/plugins/ships-log/lib/bl/js/jquery-ui/jquery-ui.min.js
Version Parameters
ships-log/css/ships-log.css?ver=ships-log/lib/bl/css/bl.css?ver=ships-log/lib/bl/js/jquery-ui/jquery-ui.min.js?ver=

HTML / DOM Fingerprints

CSS Classes
ships-log
HTML Comments
SHIPS MENUTRIP PURPOSEENTRY DATEDEPARTURE TIME+16 more
Data Attributes
id="ShipId"name="log[ShipId]"id="LogTripPurpose"name="log[TripPurpose]"id="LogEntryDate"name="log[EntryDate]"+34 more
FAQ

Frequently Asked Questions about Ship Log