WordPress Debug Security & Risk Analysis

wordpress.org/plugins/wordpress-debug

Displays and emails system information for debugging purposes for easy debugging of your own or a client/user site.

10 active installs v0.2.4 PHP + WP 3.0+ Updated Nov 19, 2015
debug
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WordPress Debug Safe to Use in 2026?

Generally Safe

Score 85/100

WordPress Debug has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The wordpress-debug plugin v0.2.4 exhibits a strong security posture in several key areas. The static analysis reveals no identified attack surface entry points, meaning there are no accessible AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code signals indicate a lack of dangerous functions, a commitment to using prepared statements for all SQL queries, and no file operations or external HTTP requests, all of which significantly reduce the potential for common attack vectors. The absence of known vulnerabilities in its history further bolsters this positive assessment. However, a notable concern arises from the output escaping analysis, where 100% of the identified outputs are not properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly echoed without sanitization. While the plugin has a strong foundation, this oversight presents a tangible risk that needs to be addressed.

Key Concerns

  • Output escaping is not properly handled
Vulnerabilities
None known

WordPress Debug Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WordPress Debug Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

0% escaped4 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
sfwd_debug_get_serverinfo (wordpress-debug.php:76)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WordPress Debug Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menuwordpress-debug.php:12
Maintenance & Trust

WordPress Debug Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 19, 2015
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WordPress Debug Developer Profile

Michael Torbert

4 plugins · 330 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WordPress Debug

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
sfwd_debug_settingssfwd_debug_mail_sentsfwd_debug_error
Data Attributes
data-sfwd_debug_send_email
FAQ

Frequently Asked Questions about WordPress Debug