SM – SQL logs Security & Risk Analysis

wordpress.org/plugins/sm-sql-logs

Record and view all SQL queries that your WordPress is requesting. Browse formated and highlighted syntax queries for debug and speedup your site.

10 active installs v1.1.1 PHP + WP 3.5+ Updated Unknown
logsmysqlqueryreportsql
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SM – SQL logs Safe to Use in 2026?

Generally Safe

Score 100/100

SM – SQL logs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The sm-sql-logs plugin v1.1.1 exhibits a mixed security posture. On the positive side, the static analysis reveals no identified vulnerabilities in its history and no critical or high severity taint flows. The plugin also avoids risky operations like file manipulation or external HTTP requests, and it does not bundle any libraries. This suggests a generally cautious approach to development in these areas.

However, significant concerns arise from the lack of security checks in the code. The absence of any nonce checks, capability checks, or even authentication checks on the identified entry points (though the total is zero) is a major red flag. Furthermore, the output escaping is very poor, with only 6% of outputs being properly escaped, leaving the plugin highly susceptible to cross-site scripting (XSS) vulnerabilities if any entry points were to be discovered or if the plugin's functionality evolves. The SQL query usage is also a point of concern, with 43% of queries not using prepared statements, which could lead to SQL injection vulnerabilities.

Key Concerns

  • Poor output escaping (XSS risk)
  • Raw SQL queries without prepared statements
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

SM – SQL logs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SM – SQL logs Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
4 prepared
Unescaped Output
17
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

57% prepared7 total queries

Output Escaping

6% escaped18 total outputs
Attack Surface

SM – SQL logs Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menuadmin\class-sm_sql_logs-admin.php:67
actionadmin_initadmin\class-sm_sql_logs-admin.php:72
actionplugins_loadedincludes\class-sm_sql_logs.php:162
actionadmin_enqueue_scriptsincludes\class-sm_sql_logs.php:177
actionadmin_enqueue_scriptsincludes\class-sm_sql_logs.php:178
actionwp_enqueue_scriptsincludes\class-sm_sql_logs.php:193
actionwp_enqueue_scriptsincludes\class-sm_sql_logs.php:194
filtershutdownincludes\class-sm_sql_logs.php:196
filterplugins_loadedincludes\class-sm_sql_logs.php:197
Maintenance & Trust

SM – SQL logs Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

SM – SQL logs Developer Profile

Mi7oSz

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SM – SQL logs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sm-sql-logs/css/sm_sql_logs-admin.css/wp-content/plugins/sm-sql-logs/js/sm_sql_logs-admin.js
Script Paths
/wp-content/plugins/sm-sql-logs/js/sm_sql_logs-admin.js
Version Parameters
sm-sql-logs/css/sm_sql_logs-admin.css?ver=sm-sql-logs/js/sm_sql_logs-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about SM – SQL logs