UsageDD Security & Risk Analysis

wordpress.org/plugins/usagedd

UsageDD allows administrators to monitor the resource usage of their WordPress installation.

1K active installs v2.1 PHP 5.4+ WP 3.0+ Updated Nov 27, 2025
cpumemorymysqlresourceusage
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is UsageDD Safe to Use in 2026?

Generally Safe

Score 100/100

UsageDD has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The plugin 'usagedd' v2.1 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any reported CVEs, coupled with the plugin not having any known vulnerabilities, suggests a history of responsible development or a lack of discovered weaknesses. The code signals indicate a commitment to secure coding practices, with all SQL queries utilizing prepared statements and a capability check present. The attack surface is also commendably zero, meaning there are no publicly exposed entry points that could be directly targeted.

However, a significant concern arises from the output escaping analysis. With 5 total outputs and 0% properly escaped, this indicates a high potential for Cross-Site Scripting (XSS) vulnerabilities. Any user-provided or dynamically generated content that is not properly escaped before being displayed in the browser can be exploited by attackers to inject malicious scripts. The taint analysis showing zero flows is a positive sign, but it cannot mitigate the risk posed by the unescaped output, which is a direct and actionable security flaw.

In conclusion, while the plugin has a clean vulnerability history and a zero attack surface, the complete lack of output escaping is a critical weakness that significantly elevates the risk profile. This issue needs immediate attention to prevent potential XSS attacks. The absence of any detected taint flows is reassuring, but the output escaping flaw remains a tangible and significant security concern.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

UsageDD Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

UsageDD Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

UsageDD Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actioninitusagedd.php:69
filterwp_xmlrpc_server_classusagedd.php:69
filterrest_jsonp_enabledusagedd.php:69
actionadmin_initusagedd.php:69
actionwp_loadedusagedd.php:69
actionwp_headusagedd.php:69
actionadmin_headusagedd.php:69
actioncustomize_controls_print_footer_scriptsusagedd.php:69
actionadmin_footerusagedd.php:69
actionwp_footerusagedd.php:69
actionassetdd_footerusagedd.php:69
actionshutdownusagedd.php:69
actionplugins_loadedusagedd.php:69
Maintenance & Trust

UsageDD Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 27, 2025
PHP min version5.4
Downloads47K

Community Trust

Rating96/100
Number of ratings19
Active installs1K
Developer Profile

UsageDD Developer Profile

Dion

2 plugins · 1K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect UsageDD

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/usagedd/

HTML / DOM Fingerprints

CSS Classes
usage-ddusagedd-bsusagedd-ss
HTML Comments
UsageDD Copyright © 2023 by Dion Designs. You can change the CSS for the usage display. DO NOT USE SINGLE-QUOTE ' CHARACTERS IN YOUR CSS! You have been warned. CSS Starts after the next line CSS ends at the previous line. DO NOT CHANGE THIS LINE!+2 more
Data Attributes
id="usage_dd"id="usage_dd_spacer"
FAQ

Frequently Asked Questions about UsageDD