Site Updates Report Security & Risk Analysis

wordpress.org/plugins/site-updates-report

Automatically track WordPress, plugin, and theme updates, and generate branded, professional client reports in email or PDF format.

20 active installs v1.1.0 PHP 7.4+ WP 5.5+ Updated Feb 6, 2026
agency-toolsclient-reportssite-updates-reportwordpress-maintenancewordpress-updates
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Site Updates Report Safe to Use in 2026?

Generally Safe

Score 100/100

Site Updates Report has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "site-updates-report" v1.1.0 plugin exhibits a generally good security posture based on the provided static analysis and vulnerability history. The plugin has a limited attack surface, with all identified entry points (AJAX handlers) being protected by authorization checks. The majority of SQL queries utilize prepared statements, and a high percentage of output is properly escaped, indicating attention to common web vulnerabilities. Furthermore, the absence of any recorded vulnerabilities (CVEs) suggests a history of responsible development or a lack of publicly disclosed issues. However, a few areas warrant attention. The presence of the `unserialize` function is a significant concern, as it can lead to object injection vulnerabilities if the serialized data originates from an untrusted source. The lack of nonce checks on AJAX handlers, while currently appearing protected by capability checks, is a deviation from best practices and could be a potential avenue for exploitation if capability checks were ever bypassed or misconfigured. The bundling of `dompdf` also presents a potential risk if the library itself is outdated or contains known vulnerabilities, though this data is not provided.

In conclusion, while the plugin demonstrates strengths in its protected attack surface and data handling practices, the identified use of `unserialize` and the absence of nonce checks on AJAX endpoints are critical areas requiring immediate review and potential remediation to achieve a more robust security posture. The clean vulnerability history is a positive indicator but should not lead to complacency, especially given the identified code signals.

Key Concerns

  • Use of unserialize function
  • Missing nonce checks on AJAX handlers
Vulnerabilities
None known

Site Updates Report Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Site Updates Report Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
20 prepared
Unescaped Output
43
170 escaped
Nonce Checks
0
Capability Checks
1
File Operations
84
External Requests
1
Bundled Libraries
1

Dangerous Functions Found

unserialize$this->objects[$obj_id] = unserialize($obj);vendor_prefixed\dompdf\php-svg-lib\src\Svg\Surface\CPdf.php:4321

Bundled Libraries

dompdf

SQL Query Safety

91% prepared22 total queries

Output Escaping

80% escaped213 total outputs
Attack Surface

Site Updates Report Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_site_updates_report_previewsrc\Settings.php:38
authwp_ajax_site_updates_report_sendsrc\Settings.php:39
authwp_ajax_site_updates_report_download_pdfsrc\Settings.php:40
WordPress Hooks 8
actioninitsite-updates-report.php:121
actionadmin_enqueue_scriptssrc\Enqueues.php:24
actionadmin_menusrc\Settings.php:35
actionadmin_initsrc\Settings.php:37
actionupgrader_pre_installsrc\Tracking.php:62
actionupgrader_post_installsrc\Tracking.php:65
actionupgrader_process_completesrc\Tracking.php:68
action_core_updated_successfullysrc\Tracking.php:71
Maintenance & Trust

Site Updates Report Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 6, 2026
PHP min version7.4
Downloads309

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Site Updates Report Developer Profile

David Allsop

2 plugins · 40 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Site Updates Report

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/site-updates-report/assets/static/admin.min.css/wp-content/plugins/site-updates-report/assets/static/admin.min.js
Script Paths
/wp-content/plugins/site-updates-report/assets/static/admin.min.js
Version Parameters
site-updates-report/assets/static/admin.min.css?ver=site-updates-report/assets/static/admin.min.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Site Updates Report