WP Count Security & Risk Analysis

wordpress.org/plugins/wp-count

Two simple shortcodes to quickly display the total download count, in plain text, of any theme or plugin, using [theme-download-count slug="t …

0 active installs v0.1 PHP + WP 5.0+ Updated Jan 21, 2026
countdownload-countplugin-download-countstatstheme-download-count
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Count Safe to Use in 2026?

Generally Safe

Score 100/100

WP Count has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The wp-count v0.1 plugin presents a mixed security posture. On the positive side, it demonstrates good practices by not exposing AJAX handlers or REST API routes without authentication and by exclusively using prepared statements for SQL queries. The absence of known CVEs and a clean vulnerability history also suggest a degree of diligence in its development and maintenance so far. However, significant concerns arise from the code analysis. The presence of the `unserialize` function without any apparent sanitization or context is a critical risk, potentially leading to Remote Code Execution if attacker-controlled data is processed. Furthermore, the complete lack of output escaping for all identified outputs is highly problematic, opening the door to Cross-Site Scripting (XSS) vulnerabilities, especially if the data being output originates from user input or external sources. The absence of nonce checks and capability checks on its entry points further exacerbates these risks by making it easier for unauthenticated or low-privileged users to trigger potential vulnerabilities. While the attack surface is currently small and all entry points appear to have some form of implicit protection, the insecure coding practices within the plugin itself are substantial weaknesses that need immediate attention.

Key Concerns

  • Dangerous function unserialize used
  • Output escaping is missing
  • Nonce checks are missing
  • Capability checks are missing
Vulnerabilities
None known

WP Count Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Count Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

WP Count Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Dangerous Functions Found

unserialize$theme_info = unserialize( $response['body'] );wp-count.php:30
unserialize$plugin_info = unserialize( $response['body'] );wp-count.php:46

Output Escaping

0% escaped2 total outputs
Attack Surface

WP Count Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[theme-download-count] wp-count.php:20
[plugin-download-count] wp-count.php:36
WordPress Hooks 1
filterwidget_textwp-count.php:18
Maintenance & Trust

WP Count Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJan 21, 2026
PHP min version
Downloads945

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WP Count Developer Profile

Web Guy

34 plugins · 52K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
629 days
View full developer profile
Detection Fingerprints

How We Detect WP Count

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-count/

HTML / DOM Fingerprints

Shortcode Output
[theme-download-count][plugin-download-count]
FAQ

Frequently Asked Questions about WP Count