Website Diary Security & Risk Analysis

wordpress.org/plugins/website-diary

For keeping diary-like notes, so you can quickly overview recent changes on your site (and spot the source of an eventual problem).

10 active installs v0.9.1 PHP + WP 2.9+ Updated Aug 28, 2010
adminadministrationdiarynotestracking
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Website Diary Safe to Use in 2026?

Generally Safe

Score 85/100

Website Diary has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "website-diary" plugin version 0.9.1 presents a mixed security posture. On one hand, the lack of identified CVEs and a clean vulnerability history are positive indicators, suggesting a history of reasonable security. The static analysis also shows a small attack surface with no identified unprotected entry points and a decent number of nonce and capability checks. However, significant concerns arise from the code analysis. The complete absence of prepared statements for six SQL queries is a critical flaw, exposing the plugin to SQL injection vulnerabilities. Furthermore, the fact that 100% of its 14 output operations are not properly escaped creates a high risk of Cross-Site Scripting (XSS) attacks. While the taint analysis did not reveal critical or high severity issues, the presence of one flow with unsanitized paths warrants attention. The plugin demonstrates good practice in avoiding dangerous functions, file operations, and external HTTP requests, but the fundamental weaknesses in handling SQL and output escaping overshadow these strengths, making it a high-risk plugin in its current state.

Key Concerns

  • SQL queries lack prepared statements
  • Output escaping is missing
  • Unsanitized path in taint flow
Vulnerabilities
None known

Website Diary Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Website Diary Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
0 prepared
Unescaped Output
14
0 escaped
Nonce Checks
3
Capability Checks
5
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared6 total queries

Output Escaping

0% escaped14 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
template_edit (website-diary.php:389)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Website Diary Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_initwebsite-diary.php:79
actionwp_dashboard_setupwebsite-diary.php:82
Maintenance & Trust

Website Diary Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedAug 28, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Website Diary Developer Profile

kahi

4 plugins · 420 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Website Diary

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/website-diary/style.css
Version Parameters
website-diary/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
webDiary_main
Data Attributes
webdiary
FAQ

Frequently Asked Questions about Website Diary