Cedexis Radar Monitoring for WordPress Security & Risk Analysis

wordpress.org/plugins/wp-cedexis

Add Cedexis Radar monitoring to your WordPress blogs.

10 active installs v0.2 PHP + WP 4.0+ Updated Jan 15, 2016
cdncedexismonitoringperformancewebperf
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cedexis Radar Monitoring for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Cedexis Radar Monitoring for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "wp-cedexis" plugin v0.2 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events suggests a minimal attack surface, which is further bolstered by the lack of unprotected entry points. Code signals are also largely positive, with no dangerous functions, file operations, or external HTTP requests identified. The plugin utilizes prepared statements for all SQL queries, and a high percentage of its outputs are properly escaped, reducing the risk of injection vulnerabilities. The taint analysis revealing no unsanitized paths is also a significant positive indicator.

However, a notable concern is the complete lack of nonce checks and capability checks. While the current entry points might be limited, this omission represents a significant security gap that could be exploited if the plugin were to evolve or if new entry points were inadvertently introduced. The vulnerability history being entirely clear is a good sign, indicating a history of secure development or minimal exposure. Nevertheless, the absence of security checks remains a foundational weakness that could become a problem as the plugin matures or its usage expands.

In conclusion, "wp-cedexis" v0.2 demonstrates commendable secure coding practices in several areas, particularly in its handling of SQL and output escaping, and its minimal attack surface. The lack of past vulnerabilities is encouraging. The primary weakness lies in the absence of nonces and capability checks, which is a fundamental security control that should be implemented to safeguard against potential future exploits, even with its current limited scope.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Some outputs not properly escaped
Vulnerabilities
None known

Cedexis Radar Monitoring for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Cedexis Radar Monitoring for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

Cedexis Radar Monitoring for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_footerwp-cedexis.php:52
actionadmin_menuwp-cedexis.php:121
actionadmin_initwp-cedexis.php:122
Maintenance & Trust

Cedexis Radar Monitoring for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 15, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Cedexis Radar Monitoring for WordPress Developer Profile

arnesonium

2 plugins · 40 total installs

92
trust score
Avg Security Score
88/100
Avg Patch Time
6 days
View full developer profile
Detection Fingerprints

How We Detect Cedexis Radar Monitoring for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
//radar.cedexis.com/1/%s/radar.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Cedexis Radar Monitoring for WordPress