Simple Log Viewer Security & Risk Analysis

wordpress.org/plugins/simple-log-viewer

A simple plugin to log errors in real time in a metabox in the admin panel, too integrated with WP-CLI

10 active installs v1.0.4 PHP 7.4+ WP 5.4+ Updated May 26, 2025
dashboard-widgetdebugerror-reportingerroslogs
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Simple Log Viewer Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Log Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The 'simple-log-viewer' plugin version 1.0.4 exhibits a generally strong security posture with no known historical vulnerabilities. The static analysis reveals a minimal attack surface, consisting of only two entry points, both of which are protected by authentication checks. Furthermore, the plugin avoids dangerous functions and exclusively uses prepared statements for its SQL queries, which are positive indicators of secure coding practices.

However, there are areas for improvement. The taint analysis identified two flows with unsanitized paths, which, while not resulting in critical or high severity issues in this analysis, represent a potential risk if they were to be exploited in conjunction with other weaknesses. Additionally, only 58% of output escaping is properly implemented, meaning that a significant portion of the plugin's output is not sanitized, potentially leading to cross-site scripting (XSS) vulnerabilities. The presence of file operations (9 total) without specific context in the analysis also warrants attention, as improper handling of file operations can lead to various security issues.

In conclusion, the plugin is well-protected against common threats like SQL injection and unauthorized access due to its robust handling of authentication and SQL queries. The absence of known CVEs is a significant strength. However, the identified unsanitized paths in taint analysis and the moderate rate of proper output escaping are weaknesses that could be exploited. Addressing these areas would further enhance the plugin's overall security.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Moderate output escaping (58% proper)
Vulnerabilities
None known

Simple Log Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple Log Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
14 escaped
Nonce Checks
2
Capability Checks
2
File Operations
9
External Requests
0
Bundled Libraries
0

Output Escaping

58% escaped24 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

4 flows2 with unsanitized paths
display_dashboard_widget (App\Views\LogView.php:14)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple Log Viewer Attack Surface

Entry Points2
Unprotected0

AJAX Handlers 1

authwp_ajax_slvpl_manual_log_checkApp\Controllers\LogController.php:28

REST API Routes 1

GET/wp-json/simplelogviewer/v1/errorsApp\Controllers\LogController.php:42
WordPress Hooks 10
actionrest_api_initApp\Controllers\LogController.php:26
actionadmin_enqueue_scriptsApp\Controllers\LogController.php:27
actionwp_dashboard_setupApp\Controllers\LogController.php:29
actionadmin_menuApp\Controllers\MenuController.php:15
actionadmin_initApp\Controllers\SettingsController.php:24
actionadmin_noticesApp\Controllers\SettingsController.php:25
actionadmin_initApp\Controllers\SettingsController.php:26
actionplugins_loadedsimple-log-viewer.php:41
actionadmin_enqueue_scriptssimple-log-viewer.php:42
actionwp_dashboard_setupsimple-log-viewer.php:69
Maintenance & Trust

Simple Log Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedMay 26, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Simple Log Viewer Developer Profile

Pedro Avelar

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Log Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-log-viewer/public/assets/js/index.js
Script Paths
/wp-content/plugins/simple-log-viewer/public/assets/js/index.js
Version Parameters
simple-log-viewer/public/assets/js/index.js?ver=

HTML / DOM Fingerprints

CSS Classes
slv-log-viewer
JS Globals
ajax_object
REST Endpoints
/wp-json/simplelogviewer/v1/errors
FAQ

Frequently Asked Questions about Simple Log Viewer