WP Debug Logger Security & Risk Analysis

wordpress.org/plugins/wp-debug-logger

A plugin that makes it easy to log code activity to a file.

10 active installs v0.1 PHP + WP 2.9.2+ Updated Unknown
debugdevelopmentlogphp
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Debug Logger Safe to Use in 2026?

Generally Safe

Score 100/100

WP Debug Logger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The wp-debug-logger v0.1 plugin exhibits a generally good security posture based on the static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the attack surface. Furthermore, the code shows positive signs with the use of prepared statements for all SQL queries and the presence of nonce checks. The lack of known CVEs and a clean vulnerability history further bolster its perceived security.

However, there are areas that warrant attention. A significant portion (50%) of the plugin's outputs are not properly escaped, creating a potential risk for Cross-Site Scripting (XSS) vulnerabilities. While taint analysis did not reveal any critical or high-severity issues, the unescaped outputs could still be exploited if user-supplied data is directly included in the output without proper sanitization. The single file operation is also a point to monitor, though without further context, its risk is unclear. The absence of capability checks on potential entry points, if any were present, would also be a concern, but the current analysis indicates zero entry points.

In conclusion, the plugin is currently in a relatively secure state due to its limited attack surface and responsible SQL handling. The primary weakness lies in output escaping, which requires immediate attention to mitigate XSS risks. The vulnerability history is a positive indicator, suggesting a history of secure development, but proactive security practices, especially regarding output sanitization, remain crucial.

Key Concerns

  • 50% of outputs not properly escaped
Vulnerabilities
None known

WP Debug Logger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Debug Logger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
4 escaped
Nonce Checks
2
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped8 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
load_admin (wp-debug-logger.php:46)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Debug Logger Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitwp-debug-logger.php:23
actionadmin_menuwp-debug-logger.php:35
actionwp-debug-logger-noticeswp-debug-logger.php:69
actionshutdownwp-debug-logger.php:168
Maintenance & Trust

WP Debug Logger Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Debug Logger Developer Profile

Donncha O Caoimh (a11n)

12 plugins · 32K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
4657 days
View full developer profile
Detection Fingerprints

How We Detect WP Debug Logger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="wp-debug-logger-enabled"name="wp_debug_logger_enabled"id="wp_log_plugins"name="wp_debug_logger_plugins[]"id="wp-debug-logger-ip"name="wp_debug_logger_ip"
JS Globals
wp_log_settingswp_log_pluginswp_log
FAQ

Frequently Asked Questions about WP Debug Logger