SQL Executioner Security & Risk Analysis

wordpress.org/plugins/sql-executioner

Execute arbitrary SQL queries against your WordPress database from the Admin.

2K active installs v1.4 PHP + WP 3.0+ Updated Sep 28, 2016
dbamysqlphpmyadminquerysql
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SQL Executioner Safe to Use in 2026?

Generally Safe

Score 85/100

SQL Executioner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin 'sql-executioner' v1.4 presents a generally positive security posture based on the static analysis. The complete absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code analysis indicates a strong adherence to secure coding practices, with all SQL queries utilizing prepared statements and a high percentage of output correctly escaped. The presence of a nonce check and file operation handling, while not inherently concerning, warrant careful review of their implementation if they were to be used in conjunction with an expanded attack surface.

The vulnerability history is remarkably clean, with no known CVEs recorded. This, combined with the clean taint analysis, suggests a well-developed and secure plugin. However, the complete lack of capability checks is a notable weakness. While the current attack surface is zero, if any future functionality is added, the absence of proper authorization checks could become a critical security flaw. The single file operation, though not indicative of a problem on its own, is an area that would require scrutiny in a deeper audit to ensure it's not susceptible to path traversal or other file manipulation vulnerabilities. Overall, the plugin appears secure due to its limited functionality and good coding practices, but the lack of capability checks is a potential future risk if the plugin evolves.

Key Concerns

  • Missing capability checks
Vulnerabilities
None known

SQL Executioner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SQL Executioner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
10 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

77% escaped13 total outputs
Attack Surface

SQL Executioner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initsql-executioner.php:37
actionadmin_menusql-executioner.php:38
Maintenance & Trust

SQL Executioner Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedSep 28, 2016
PHP min version
Downloads53K

Community Trust

Rating92/100
Number of ratings11
Active installs2K
Developer Profile

SQL Executioner Developer Profile

Justin Watt

3 plugins · 2K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SQL Executioner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sql-executioner/style.css/wp-content/plugins/sql-executioner/script.js
Script Paths
/wp-content/plugins/sql-executioner/script.js
Version Parameters
sql-executioner/style.css?ver=sql-executioner/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about SQL Executioner