WP Local Storage Security & Risk Analysis

wordpress.org/plugins/wp-local-storage

This plugin automatically and periodically saves the "just typed comment" for visitors so no data will be lost even the browser crashed.

10 active installs v1.0 PHP + WP 2.7+ Updated Jun 8, 2011
blogclient-side-storagecommentslocal-storageuser-input
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Local Storage Safe to Use in 2026?

Generally Safe

Score 85/100

WP Local Storage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The wp-local-storage plugin version 1.0 exhibits a seemingly strong security posture based on the static analysis provided. The absence of identified dangerous functions, SQL queries (all using prepared statements), file operations, external HTTP requests, and critical taint flows suggests a well-written codebase with limited potential for common vulnerabilities. Furthermore, the plugin has no recorded vulnerability history, which is a positive indicator.

However, a significant concern arises from the complete lack of output escaping and the absence of nonce and capability checks across all entry points. While the attack surface is reported as zero, this is likely due to the fact that no AJAX handlers, REST API routes, shortcodes, or cron events were detected in the analysis. If any of these entry points were present but not detected, the lack of security checks would be critical. The 100% unescaped output is a serious weakness, as it opens the door to potential cross-site scripting (XSS) vulnerabilities, especially if any user-supplied data were to be outputted without sanitization. The lack of any detected flows in the taint analysis might be a limitation of the tool or the analysis itself, and does not negate the risk posed by unescaped output.

In conclusion, while the plugin's code does not appear to contain deeply embedded vulnerabilities like raw SQL or dangerous functions, the complete omission of output escaping and any form of authorization checks (nonces, capabilities) represents a notable security risk. The strength lies in the lack of known historical vulnerabilities and the use of prepared statements. The weakness lies in the fundamental security hygiene of output sanitization and the reliance on the absence of discoverable entry points for security.

Key Concerns

  • All outputs are unescaped
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

WP Local Storage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Local Storage Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

WP Local Storage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

WP Local Storage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menufunc/function.php:3
actionwp_headfunc/function.php:25
actionadmin_headfunc/function.php:28
Maintenance & Trust

WP Local Storage Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJun 8, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Local Storage Developer Profile

xhtmlweaver

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Local Storage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-localstorage/js/wp-localstorage.js/wp-content/plugins/wp-localstorage/js/wp-localstorage-posts.js/wp-content/plugins/wp-localstorage/css/wp-localstorage.css/wp-content/plugins/wp-localstorage/img/store.png
Script Paths
/wp-content/plugins/wp-localstorage/js/wp-localstorage.js/wp-content/plugins/wp-localstorage/js/wp-localstorage-posts.js

HTML / DOM Fingerprints

CSS Classes
icon32wrap
Data Attributes
name="WPLS_storecomment"name="WPLS_storepost"value="checkbox"name="action"value="update"name="page_options"+4 more
JS Globals
window.WPLS_opt
FAQ

Frequently Asked Questions about WP Local Storage