Surbma | WP Control Security & Risk Analysis

wordpress.org/plugins/surbma-wp-control

Very useful fixes and add-ons for WordPress Multisite installations.

10 active installs v21.0 PHP 7.4+ WP 5.4+ Updated Sep 6, 2024
multisitenetwork
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Surbma | WP Control Safe to Use in 2026?

Generally Safe

Score 92/100

Surbma | WP Control has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "surbma-wp-control" v21.0 plugin exhibits an excellent security posture. The plugin demonstrates strong adherence to secure coding practices, with no identified dangerous functions, all SQL queries utilizing prepared statements, and all output being properly escaped. Furthermore, the absence of file operations and external HTTP requests minimizes common attack vectors. The lack of any recorded vulnerabilities, including CVEs, further reinforces this positive assessment. This suggests a proactive and well-maintained security approach by the developers.

While the current analysis shows no direct vulnerabilities, it's important to note that the plugin reports zero entry points that require authentication. This could be a strength if the plugin genuinely has no user-facing interactions that need protection, or a potential area for concern if there are unaddressed functionalities. The zero nonce checks and capability checks also align with this observation, indicating that the plugin might not be designed for complex or user-specific interactions that would typically require such security measures. However, the complete absence of any identified issues in the static analysis is a significant positive indicator of secure development.

Key Concerns

  • No unprotected AJAX handlers
  • No unprotected REST API routes
  • No dangerous functions used
  • All SQL queries use prepared statements
  • All output is properly escaped
  • No file operations detected
  • No external HTTP requests detected
  • No nonce checks detected
  • No capability checks detected
  • No unsanitized taint flows
  • No known CVEs
Vulnerabilities
None known

Surbma | WP Control Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Surbma | WP Control Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Surbma | WP Control Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedsurbma-wp-control.php:28
actionsurbma_premium_wp_gtag_settingssurbma-wp-control.php:42
actionwp_headsurbma-wp-control.php:57
actionadmin_headsurbma-wp-control.php:58
actionlogin_headsurbma-wp-control.php:59
Maintenance & Trust

Surbma | WP Control Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedSep 6, 2024
PHP min version7.4
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Surbma | WP Control Developer Profile

Surbma

27 plugins · 30K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
127 days
View full developer profile
Detection Fingerprints

How We Detect Surbma | WP Control

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- Global site tag (gtag.js) - Google Analytics -->
JS Globals
gtagdataLayer
FAQ

Frequently Asked Questions about Surbma | WP Control