Vulnerable Plugin Checker Security & Risk Analysis

wordpress.org/plugins/vulnerable-plugin-checker

Automatically checks installed plugins for known vulnerabilities and provides optional email alerts.

200 active installs v0.3.12 PHP + WP 4.0+ Updated Nov 16, 2017
checkerpluginsscannervulnerabilityvulnerable
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Vulnerable Plugin Checker Safe to Use in 2026?

Generally Safe

Score 85/100

Vulnerable Plugin Checker has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "vulnerable-plugin-checker" plugin v0.3.12 presents a generally good security posture based on the provided static analysis. The complete absence of direct attack surface points like unprotected AJAX handlers, REST API routes, and shortcodes is a significant strength. Furthermore, the code demonstrates a commitment to secure SQL handling by utilizing prepared statements for all queries. The lack of dangerous functions, file operations, and external HTTP requests also contributes positively to its security profile.

However, there are areas for improvement. The output escaping is only 40% proper, meaning a significant portion of output might be vulnerable to Cross-Site Scripting (XSS) attacks if the data originates from user input or untrusted sources. The absence of nonce and capability checks, while not directly tied to an exposed attack surface in this analysis, could indicate a general oversight in secure coding practices that might become relevant if new entry points are introduced. The plugin also has one cron event, which, without specific details, could potentially be a vector if not properly secured.

With no known CVEs in its history, the plugin has a clean record, suggesting a responsible development approach regarding vulnerability management. This history, combined with the static analysis findings, indicates a plugin that is likely secure against common widespread threats. However, the moderate output escaping and the lack of comprehensive security checks on internal processes warrant attention to achieve a more robust security posture.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Vulnerable Plugin Checker Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Vulnerable Plugin Checker Release Timeline

v0.3.12Current
v0.3.11
v0.3.10
v0.3.9
v0.3.8
v0.3.7
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3
v0.2.4
v0.2.3
v0.2.2
v0.2.1
v0.2
v0.1.4
v0.1.3
Code Analysis
Analyzed Mar 16, 2026

Vulnerable Plugin Checker Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

40% escaped5 total outputs
Attack Surface

Vulnerable Plugin Checker Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_headvulnerable-plugin-checker.php:38
actionvpc_pull_db_data_eventvulnerable-plugin-checker.php:41
actionactivated_pluginvulnerable-plugin-checker.php:46
actionupgrader_process_completevulnerable-plugin-checker.php:47
actionadmin_menuvulnerable-plugin-checker.php:49
actionadmin_initvulnerable-plugin-checker.php:51
actionadmin_noticesvulnerable-plugin-checker.php:360

Scheduled Events 1

vpc_pull_db_data_event
Maintenance & Trust

Vulnerable Plugin Checker Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedNov 16, 2017
PHP min version
Downloads9K

Community Trust

Rating76/100
Number of ratings8
Active installs200
Developer Profile

Vulnerable Plugin Checker Developer Profile

Storm Rockwell

2 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Vulnerable Plugin Checker

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/vulnerable-plugin-checker/css/vpc.css/wp-content/plugins/vulnerable-plugin-checker/js/vpc.js
Script Paths
/wp-content/plugins/vulnerable-plugin-checker/js/vpc.js
Version Parameters
vulnerable-plugin-checker/css/vpc.css?ver=vulnerable-plugin-checker/js/vpc.js?ver=

HTML / DOM Fingerprints

CSS Classes
vpc-settings-groupvpc_email_addressvpc_allow_emails
Data Attributes
name="vpc_email_address"name="vpc_allow_emails"
FAQ

Frequently Asked Questions about Vulnerable Plugin Checker