System Report Security & Risk Analysis

wordpress.org/plugins/system-report

Quickly identify important aspects of your server, PHP, WordPress installation, theme and plugins

10 active installs v2.1.0 PHP + WP 3.3+ Updated Jul 1, 2017
informationreportstatussystem
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is System Report Safe to Use in 2026?

Generally Safe

Score 85/100

System Report has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The system-report plugin v2.1.0 exhibits a mixed security posture. While it has no reported vulnerabilities (CVEs) and a seemingly small attack surface based on the provided metrics, the static analysis reveals significant concerns. The presence of the `exec` function is a critical warning sign, as it can be exploited for arbitrary code execution if improperly handled. Furthermore, two identified taint flows with unsanitized paths suggest potential vulnerabilities where user-supplied data could be used to manipulate file paths or other sensitive operations without proper validation. The low percentage of properly escaped output (26%) also indicates a risk of cross-site scripting (XSS) vulnerabilities.

Key Concerns

  • Dangerous function 'exec' found
  • Taint flows with unsanitized paths (2)
  • Low percentage of properly escaped output
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

System Report Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

System Report Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
4 prepared
Unescaped Output
14
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

exec@exec( $cmd, $output );src\system-load.php:47

SQL Query Safety

67% prepared6 total queries

Output Escaping

26% escaped19 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
get_server_report (views\server.php:10)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

System Report Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menusystem-report.php:63
Maintenance & Trust

System Report Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedJul 1, 2017
PHP min version
Downloads10K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

System Report Developer Profile

Aaron Holbrook

4 plugins · 40 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect System Report

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/system-report/assets/css/bootstrap.min.css/wp-content/plugins/system-report/assets/css/system-report.css/wp-content/plugins/system-report/assets/js/bootstrap.min.js/wp-content/plugins/system-report/assets/js/system-report.js
Script Paths
/wp-content/plugins/system-report/assets/js/system-report.js/wp-content/plugins/system-report/assets/js/bootstrap.min.js
Version Parameters
system-report/assets/css/bootstrap.min.css?ver=system-report/assets/css/system-report.css?ver=system-report/assets/js/bootstrap.min.js?ver=system-report/assets/js/system-report.js?ver=

HTML / DOM Fingerprints

CSS Classes
system-report-wrappersystem-report-content
HTML Comments
<!-- System Report by Aaron Holbrook -->
Data Attributes
data-bs-toggledata-bs-target
JS Globals
window.sr_data
FAQ

Frequently Asked Questions about System Report