Update Logger Security & Risk Analysis

wordpress.org/plugins/update-logger

Log WordPress updates, so you can exclude 3rd party plugins from your repo.

0 active installs v1.0.1 PHP 5.4+ WP 4.0+ Updated Nov 15, 2024
developerlogupdateupdate-logupdate-logger
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Update Logger Safe to Use in 2026?

Generally Safe

Score 92/100

Update Logger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "update-logger" plugin v1.0.1 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events, particularly those lacking authentication or permission checks, significantly limits the attack surface. Furthermore, the code does not utilize dangerous functions, perform file operations, or make external HTTP requests. The use of prepared statements for all SQL queries is a critical best practice that prevents SQL injection vulnerabilities.

However, a significant concern arises from the complete lack of output escaping. With two total outputs and 0% properly escaped, any data rendered to the user interface originating from this plugin is vulnerable to Cross-Site Scripting (XSS) attacks. The absence of nonce checks and capability checks on any potential entry points (though none were identified) also represents a potential gap if such features were to be added in the future without proper security considerations. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign but does not mitigate the identified output escaping issue.

In conclusion, while the plugin has strong foundations in preventing common web vulnerabilities like SQL injection and limiting its attack surface, the critical oversight in output escaping leaves it susceptible to XSS. Developers should prioritize implementing proper output sanitization to address this risk. The lack of identified entry points is a strength, but the absence of security checks on those nonexistent points is a weakness if functionality expands.

Key Concerns

  • Unescaped output in all identified outputs
  • No nonce checks on any potential entry points
  • No capability checks on any potential entry points
Vulnerabilities
None known

Update Logger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Update Logger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Update Logger Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitupdate-logger.php:74
actionupgrader_process_completeupdate-logger.php:84
actionadmin_noticesupdate-logger.php:127
Maintenance & Trust

Update Logger Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 15, 2024
PHP min version5.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Update Logger Developer Profile

Poly Plugins

9 plugins · 320 total installs

93
trust score
Avg Security Score
98/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Update Logger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
notice-error
Data Attributes
data-title='Loginator'
FAQ

Frequently Asked Questions about Update Logger