
Where Am I Security & Risk Analysis
wordpress.org/plugins/whereamiAdds a HTML comment in the head on the front-end with current server name and address. Description = Where Am I is a tiny WordPress plugin which ad …
Is Where Am I Safe to Use in 2026?
Generally Safe
Score 85/100Where Am I has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "whereami" v1.0 plugin exhibits a generally good security posture based on the provided static analysis. It boasts no identified attack surface points (AJAX, REST API, shortcodes, cron), no dangerous functions, no direct SQL queries (all use prepared statements), no file operations, and no external HTTP requests. Furthermore, there's no recorded vulnerability history, suggesting a lack of publicly known issues. This indicates that the developers have taken steps to implement secure coding practices in these areas.
However, a significant concern arises from the output escaping analysis. 100% of outputs are unescaped, meaning any data rendered by the plugin is potentially vulnerable to Cross-Site Scripting (XSS) attacks. The taint analysis, while reporting no critical or high-severity flows, does highlight two flows with unsanitized paths. While these may not have escalated to critical issues in this analysis, they represent potential vectors for further exploitation if not properly handled. The absence of nonce and capability checks on potential (though currently none identified) entry points also leaves a theoretical gap in securing future additions or if the attack surface expands.
In conclusion, the "whereami" plugin demonstrates strengths in its minimal attack surface and use of prepared statements. The primary weakness lies in the complete lack of output escaping, presenting a clear XSS risk. The presence of unsanitized paths in taint analysis, although not rated as critical, warrants attention. The absence of historical vulnerabilities is a positive sign, but it does not negate the immediate risks identified in the code analysis.
Key Concerns
- 100% of outputs unescaped
- Unsanitized paths in taint analysis
- No nonce checks
- No capability checks
Where Am I Security Vulnerabilities
Where Am I Release Timeline
Where Am I Code Analysis
Output Escaping
Data Flow Analysis
Where Am I Attack Surface
WordPress Hooks 1
Maintenance & Trust
Where Am I Maintenance & Trust
Maintenance Signals
Community Trust
Where Am I Alternatives
Suicide
suicide
Remove all content from your blog's database (by table). Multisite compatible.
CPD-Journals
cpd-journals
Turns a WordPress Multisite installation into a CPD (Continuous Professional Development) journal platform.
Code Snippets
code-snippets
An easy, clean and simple way to enhance your site with code snippets.
User Switching
user-switching
Instant switching between user accounts in WordPress and WooCommerce.
Safe Redirect Manager
safe-redirect-manager
Safely manage your website's HTTP redirects.
Where Am I Developer Profile
8 plugins · 10K total installs
How We Detect Where Am I
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<!-- WHERE AM I? --><!-- IP: --><!-- SERVER NAME: +1 more