WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Security & Risk Analysis

wordpress.org/plugins/wp-geeky-troubleshooter

Easily Troubleshoot Your WordPress Site wihout Affecting Live Site.

10 active installs v1.0.0 PHP 5.6+ WP 4.4+ Updated Apr 6, 2019
troubleshootwsod
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Safe to Use in 2026?

Generally Safe

Score 85/100

WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The wp-geeky-troubleshooter plugin v1.0.0 exhibits a generally good security posture based on the provided static analysis. The absence of any known CVEs, unpatched vulnerabilities, or vulnerabilities of any severity in its history is a significant strength. Furthermore, the code analysis reveals no critical or high severity taint flows, no raw SQL queries, and a substantial number of nonce and capability checks, indicating an effort to implement secure coding practices. The lack of external HTTP requests also reduces the attack surface.

However, there are areas for improvement. While the number of unprotected entry points is zero, 4 AJAX handlers represent potential entry points that, while currently protected by checks (as implied by the 0 unprotected count), would be a higher risk if those checks were ever bypassed or found insufficient. The output escaping, while 77% proper, still leaves a portion of outputs unescaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if untrusted data is involved in those specific outputs. The presence of file operations, while not inherently insecure, requires careful scrutiny in the context of the plugin's functionality to ensure they are not susceptible to arbitrary file read/write vulnerabilities.

Overall, the plugin's security history is excellent, and the static analysis shows a solid foundation. The main potential risks lie in the remaining unescaped outputs and the inherent nature of AJAX handlers as potential attack vectors that need continuous vigilance. The absence of known vulnerabilities suggests that the developers have been diligent, but the remaining code signals warrant attention for a truly robust security profile.

Key Concerns

  • Unescaped output identified
  • Potential risk in AJAX handlers (no explicit auth bypass found)
Vulnerabilities
None known

WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
10
34 escaped
Nonce Checks
7
Capability Checks
3
File Operations
7
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

77% escaped44 total outputs
Data Flows
All sanitized

Data Flow Analysis

5 flows
save_config_constants (support-core\class-gs-admin.php:164)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Attack Surface

Entry Points4
Unprotected0

AJAX Handlers 4

authwp_ajax_wgs_save_remote_accesssupport-core\class-gs-admin.php:63
authwp_ajax_wgs_regenerate_login_linksupport-core\class-gs-admin.php:64
authwp_ajax_wgs_save_troubleshoot_modesupport-core\class-gs-admin.php:66
authwp_ajax_wgs_save_security_codesupport-core\class-gs-admin.php:68
WordPress Hooks 13
actionadmin_menusupport-core\class-gs-admin.php:59
actioninitsupport-core\class-gs-admin.php:61
actionadmin_enqueue_scriptssupport-core\class-gs-admin.php:114
actioninitsupport-core\class-gs-front.php:72
filtertemplatesupport-core\class-gs-front.php:242
filterstylesheetsupport-core\class-gs-front.php:243
actionplugins_loadedsupport-core\class-gs-loader.php:64
actionadmin_menusupport-core\class-gs-security-mode.php:49
actionadmin_initsupport-core\class-gs-security-mode.php:50
filteroption_active_pluginssupport-core\class-gs-security-mode.php:277
filteroption_active_sitewide_pluginssupport-core\class-gs-security-mode.php:278
filteroption_active_pluginssupport-core\mu-plugins\class-gs-mu-plugin.php:61
filteroption_active_sitewide_pluginssupport-core\mu-plugins\class-gs-mu-plugin.php:62
Maintenance & Trust

WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedApr 6, 2019
PHP min version5.6
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP Developer Profile

Sandesh

6 plugins · 740 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-geeky-troubleshooter/css/support-center.css/wp-content/plugins/wp-geeky-troubleshooter/js/support-center.js
Script Paths
/wp-content/plugins/wp-geeky-troubleshooter/js/support-center.js
Version Parameters
wp-geeky-troubleshooter/css/support-center.css?ver=wp-geeky-troubleshooter/js/support-center.js?ver=

HTML / DOM Fingerprints

CSS Classes
geeky-support-admin
Data Attributes
data-nonce
JS Globals
geeky_support
REST Endpoints
/wp-json/wgs/
FAQ

Frequently Asked Questions about WP Geeky Troubleshooter – Troubleshoot Your WordPress Site without FTP