WP Dev Dashboard Security & Risk Analysis

wordpress.org/plugins/wp-dev-dashboard

The better tool for monitoring your plugins & themes, including support requests, download stats, version support, and more.

10 active installs v1.4 PHP + WP 3.5+ Updated Oct 9, 2016
dashboarddevthemeunresolved
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Dev Dashboard Safe to Use in 2026?

Generally Safe

Score 85/100

WP Dev Dashboard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The wp-dev-dashboard plugin, in version 1.4, presents a mixed security posture. On the positive side, it avoids dangerous functions, uses prepared statements for all SQL queries, and has no recorded vulnerability history, suggesting a generally cautious development approach. However, significant security concerns arise from the static analysis. The presence of one unprotected AJAX handler is a critical finding, as it represents a direct entry point for attackers without any authentication or authorization checks. Furthermore, the low percentage of properly escaped output (5%) indicates a high risk of cross-site scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly in the browser without adequate sanitization. Taint analysis also reveals flows with unsanitized paths, hinting at potential issues with how data is handled, even if not immediately classified as critical or high severity in the provided metrics. The absence of nonce checks and capability checks on the AJAX handler further exacerbates the risk, leaving it vulnerable to CSRF and unauthorized actions.

In conclusion, while the plugin demonstrates good practices in areas like SQL querying and has a clean vulnerability history, the unprotected AJAX handler and widespread output escaping deficiencies are serious weaknesses. These flaws create a significant attack surface that could be exploited for various malicious purposes, including unauthorized data modification, information disclosure, or XSS attacks. Developers should prioritize addressing the unprotected AJAX handler and implementing robust output escaping mechanisms throughout the plugin to improve its overall security.

Key Concerns

  • Unprotected AJAX handler
  • Low percentage of properly escaped output
  • No nonce checks on AJAX
  • No capability checks on AJAX
  • Taint flows with unsanitized paths
Vulnerabilities
None known

WP Dev Dashboard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Dev Dashboard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

5% escaped22 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
do_settings_page (admin\class-wp-dev-dashboard-admin.php:216)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP Dev Dashboard Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_refresh_wpddincludes\class-wp-dev-dashboard.php:223
WordPress Hooks 5
actionplugins_loadedincludes\class-wp-dev-dashboard.php:198
actionadmin_enqueue_scriptsincludes\class-wp-dev-dashboard.php:213
actionadmin_enqueue_scriptsincludes\class-wp-dev-dashboard.php:214
actionadmin_menuincludes\class-wp-dev-dashboard.php:217
actionadmin_initincludes\class-wp-dev-dashboard.php:218
Maintenance & Trust

WP Dev Dashboard Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedOct 9, 2016
PHP min version
Downloads4K

Community Trust

Rating96/100
Number of ratings5
Active installs10
Developer Profile

WP Dev Dashboard Developer Profile

Mickey Kay

5 plugins · 71K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
467 days
View full developer profile
Detection Fingerprints

How We Detect WP Dev Dashboard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-dev-dashboard/css/wp-dev-dashboard-admin.css/wp-content/plugins/wp-dev-dashboard/js/wp-dev-dashboard-admin.js
Script Paths
/wp-content/plugins/wp-dev-dashboard/js/wp-dev-dashboard-admin.js
Version Parameters
wp-dev-dashboard/css/wp-dev-dashboard-admin.css?ver=wp-dev-dashboard/js/wp-dev-dashboard-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpdd-settings-tabs
HTML Comments
TO DO Add refresh button at top of list as well as bottom. Consider adding list table for sortable plugin/theme view. Make metabox plugin [count] reflect unresolved and resolved accordingly when switching setting. Add link to main forum for plugin/theme. Integrate github issues. Initialize the class and set its properties.Creates or returns an instance of this class.The code that runs during plugin activation.+2 more
Data Attributes
data-tab-name
JS Globals
wpddSettings
FAQ

Frequently Asked Questions about WP Dev Dashboard