System information Security & Risk Analysis

wordpress.org/plugins/system-information

Adds a system information page that include all the details on your WordPress configuration.

10 active installs v1.0.1 PHP + WP 2.5+ Updated Feb 9, 2014
adminconfigurationdebugdebuggingdump
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is System information Safe to Use in 2026?

Generally Safe

Score 85/100

System information has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "system-information" plugin v1.0.1 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by avoiding dangerous functions, utilizing prepared statements exclusively for SQL queries, and having no file operations or external HTTP requests. The lack of known CVEs in its history also suggests a potentially stable codebase.

However, significant concerns arise from the static analysis. The most critical finding is that 100% of outputs are not properly escaped. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, as any user-controlled data that is outputted by the plugin could potentially be injected with malicious scripts. Additionally, the taint analysis reveals two flows with unsanitized paths, which, while not flagged as critical or high severity in this report, warrant investigation as they could lead to unexpected behavior or potential vulnerabilities if data is not handled correctly.

In conclusion, while the plugin has a clean vulnerability history and employs good practices in areas like SQL and file handling, the complete lack of output escaping is a critical flaw. This, combined with the presence of unsanitized paths, significantly elevates the risk associated with this plugin. The absence of nonces and capability checks on any entry points (though none were identified) also means that if any were introduced in future versions without proper checks, the plugin would be vulnerable.

Key Concerns

  • 100% of outputs unescaped
  • Unsanitized paths in taint analysis
  • No nonce checks identified
  • No capability checks identified
Vulnerabilities
None known

System information Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

System information Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
64
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped64 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
system_information_page (system-information.php:46)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

System information Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menusystem-information.php:257
Maintenance & Trust

System information Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 9, 2014
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

System information Developer Profile

philippe

9 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect System information

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrappoststuffui-sortablepostboxopened
Data Attributes
readonlyrowscolswrapstyleonfocus
FAQ

Frequently Asked Questions about System information