WP Database Fetch Security & Risk Analysis

wordpress.org/plugins/wp-database-fetch

This plugin will allow you to get Posts, Pages, etc from other wordpress websites on same hosting. Helpful to create Mircosites.

10 active installs v1.3.1 PHP + WP 3.0.1+ Updated Unknown
contentpulldatabasemicrositemultisite
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Database Fetch Safe to Use in 2026?

Generally Safe

Score 100/100

WP Database Fetch has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'wp-database-fetch' plugin v1.3.1 exhibits a strong security posture. The static analysis reveals no identifiable attack surface through AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates excellent security practices, with no dangerous functions, all SQL queries using prepared statements, and all output properly escaped. The absence of file operations, external HTTP requests, and the lack of observed taint flows further solidify this positive assessment. The plugin's vulnerability history is equally clean, with zero recorded CVEs, indicating a history of secure development and maintenance. However, the complete absence of nonce and capability checks across all entry points (though there are no identified entry points) represents a potential theoretical concern if any attack vectors were to emerge in future versions or through unforeseen interactions. This could become a weakness if the plugin's functionality were to expand or if new vulnerabilities were discovered that could be exploited via these unauthenticated or unverified paths. Overall, the plugin appears to be very secure in its current state, but a complete lack of access control mechanisms is a minor, albeit theoretical, point to monitor.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

WP Database Fetch Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Database Fetch Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WP Database Fetch Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuindex.php:19
actionadmin_initindex.php:25
Maintenance & Trust

WP Database Fetch Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP Database Fetch Developer Profile

Mohammed Salman Khan

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Database Fetch

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-database-fetch/assets/widget.php/wp-content/plugins/wp-database-fetch/assets/main.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Database Fetch