
Stay Alive Security & Risk Analysis
wordpress.org/plugins/stay-aliveStay Alive wordpress plugin to check online user's in your website in just minutes with widget or shortcode using Pusher 3rd party socket service …
Is Stay Alive Safe to Use in 2026?
Generally Safe
Score 85/100Stay Alive has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'stay-alive' v2.4.8 plugin exhibits a mixed security posture. While it demonstrates good practices in its use of prepared statements for SQL queries and a lack of file operations or external HTTP requests, several significant concerns are present. The presence of an unprotected AJAX handler is a primary risk, creating an easily accessible entry point for potential attackers. Furthermore, the use of the `create_function` dangerous function, although not directly linked to a taint flow in this analysis, is a code smell that can lead to security vulnerabilities if not handled with extreme care. The output escaping is also only moderately effective, with 45% of outputs not being properly escaped, potentially exposing the site to cross-site scripting (XSS) vulnerabilities.
The plugin has no recorded vulnerability history, which is a positive indicator. However, this could also simply mean that it hasn't been a target or that past vulnerabilities were not publicly disclosed or significant enough to be tracked. The taint analysis shows flows with unsanitized paths, which, while not classified as critical or high in this instance, still highlight potential weaknesses in how data is handled within the plugin. The absence of nonce checks and capability checks on its entry points further exacerbates the risk associated with the unprotected AJAX handler.
In conclusion, 'stay-alive' v2.4.8 has strengths in its database query handling and avoidance of risky network operations. However, its security is significantly undermined by an unprotected AJAX endpoint, insufficient output escaping, and the use of a dangerous function. The lack of historical vulnerabilities should not lead to complacency, as the identified code issues present tangible risks that require immediate attention.
Key Concerns
- Unprotected AJAX handler
- Dangerous function: create_function
- Unescaped output (45%)
- Flows with unsanitized paths
- Missing nonce checks
- Missing capability checks
Stay Alive Security Vulnerabilities
Stay Alive Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Stay Alive Attack Surface
AJAX Handlers 1
Shortcodes 1
WordPress Hooks 8
Maintenance & Trust
Stay Alive Maintenance & Trust
Maintenance Signals
Community Trust
Stay Alive Alternatives
WP Online Active Users
online-active-users
WP Online Active Users is a lightweight, powerful plugin to monitor and display how many users are currently online active on your WordPress website.
Display Live Visitors & Counter
display-live-visitors-counter
Show How Many Users Are Online On Your Wordpress Site.
Fullworks Active Users Monitor
fullworks-active-users-monitor
Real-time monitoring of logged-in WordPress users with visual indicators, filtering, and comprehensive admin tools.
WP User Chat
wp-user-chat
These plugins gives you many to many interaction through chat like social media`s. Additionaly, you can share your feelings with every logged-in users …
Active Users List
active-users-list
List all the current active users
Stay Alive Developer Profile
1 plugin · 0 total installs
How We Detect Stay Alive
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/stay-alive/assets/css/stay-alive.css/wp-content/plugins/stay-alive/assets/js/stay-alive.jsstay-alive.css?ver=stay-alive.js?ver=HTML / DOM Fingerprints
stay_alivestay_alive_usersname="stay_alive_credentials[pusher_app_id]"name="stay_alive_credentials[pusher_key]"name="stay_alive_credentials[pusher_secret]"name="stay_alive_credentials[pusher_cluster]"config/wp-json/stay_alive_auth<div class="stay_alive">
<ul class="stay_alive_users"></ul>
</div>