WP Logger Security & Risk Analysis

wordpress.org/plugins/wp-data-logger

Logging vars and events for fast debug WordPress site.

300 active installs v2.4 PHP 7.1+ WP 3.5+ Updated Dec 1, 2025
datadebugdeveloploglogger
99
A · Safe
CVEs total1
Unpatched0
Last CVEApr 17, 2025
Download
Safety Verdict

Is WP Logger Safe to Use in 2026?

Generally Safe

Score 99/100

WP Logger has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 17, 2025Updated 4mo ago
Risk Assessment

The "wp-data-logger" plugin version 2.4 exhibits a mixed security posture. While the static analysis shows a remarkably small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, indicating a positive effort to limit entry points. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is a strong point in its favor. However, concerns arise from the low percentage of properly escaped output (11%), suggesting a potential for cross-site scripting (XSS) vulnerabilities if data is not handled carefully before rendering.

The vulnerability history reveals one known medium severity CVE, which is currently patched. The pattern of "Missing Authorization" as a common vulnerability type is a significant red flag, even though it's patched in this version. This suggests a historical tendency to overlook or incorrectly implement authorization checks, which could still be a latent risk if not thoroughly addressed in all code paths. The lack of critical or high severity vulnerabilities and a clean taint analysis report are positive indicators, but the low output escaping and historical authorization issues warrant careful consideration.

In conclusion, "wp-data-logger" v2.4 has strengths in its limited attack surface and absence of critical code signals like dangerous functions. However, the low output escaping and past authorization issues, even if patched, present ongoing concerns. Continued vigilance in development and thorough code reviews for authorization and output sanitization are recommended.

Key Concerns

  • Low percentage of properly escaped output
  • Historical vulnerability: Missing Authorization
Vulnerabilities
1

WP Logger Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-39456medium · 4.3Missing Authorization

WP Logger <= 2.2 - Missing Authorization

Apr 17, 2025 Patched in 2.2.1 (5d)
Code Analysis
Analyzed Mar 16, 2026

WP Logger Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
8
1 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

11% escaped9 total outputs
Attack Surface

WP Logger Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuclass-wp-data-logger.php:19
actionupgrader_process_completeclass-wp-data-logger.php:31
actionloggerclass-wp-data-logger.php:36
filterwp_logger_button_panelclass-wp-data-logger.php:372
Maintenance & Trust

WP Logger Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedDec 1, 2025
PHP min version7.1
Downloads7K

Community Trust

Rating100/100
Number of ratings3
Active installs300
Developer Profile

WP Logger Developer Profile

iTRON

7 plugins · 11K total installs

95
trust score
Avg Security Score
93/100
Avg Patch Time
4 days
View full developer profile
Detection Fingerprints

How We Detect WP Logger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-data-logger/js/wpdl-admin.js/wp-content/plugins/wp-data-logger/css/wpdl-admin.css
Script Paths
/wp-content/plugins/wp-data-logger/js/wpdl-admin.js
Version Parameters
wp-data-logger/js/wpdl-admin.js?ver=wp-data-logger/css/wpdl-admin.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Logger