WP Peon Security & Risk Analysis

wordpress.org/plugins/wp-peon

An helper plugin for getting work done quickly from admin panel.

10 active installs vv1.0.0 PHP + WP 3.0+ Updated Jan 30, 2016
editorexecuteexplorerfile-editorhtaccess
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Peon Safe to Use in 2026?

Generally Safe

Score 85/100

WP Peon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The wp-peon plugin version 1.0.0 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by having no known CVEs in its history and a clean slate regarding critical or high-severity vulnerabilities. The static analysis also indicates no dangerous functions, all SQL queries are prepared, and there are no external HTTP requests, which are all favorable indicators. However, significant concerns arise from the complete lack of output escaping, with 0% of identified outputs being properly escaped. This represents a substantial risk for cross-site scripting (XSS) vulnerabilities. Additionally, while there's one unsanitized path identified in the taint analysis, it is not currently flagged as critical or high severity, which warrants further investigation but does not immediately present a high risk based on the provided data. The plugin also has a relatively low attack surface with zero identified entry points requiring authentication, which is positive, but the complete absence of capability checks is a weakness that could be exploited if new entry points are introduced or if existing ones are implicitly insecure.

Key Concerns

  • No output escaping
  • Flows with unsanitized paths (not critical/high)
  • No capability checks
Vulnerabilities
None known

WP Peon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Peon Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

WP Peon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
29
0 escaped
Nonce Checks
3
Capability Checks
0
File Operations
10
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped29 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

4 flows1 with unsanitized paths
<wp-peon-explorer> (admin\partials\wp-peon-explorer.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Peon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedincludes\class-wp-peon.php:140
actionadmin_enqueue_scriptsincludes\class-wp-peon.php:155
actionadmin_enqueue_scriptsincludes\class-wp-peon.php:156
actionadmin_menuincludes\class-wp-peon.php:159
actionwp_enqueue_scriptsincludes\class-wp-peon.php:173
actionwp_enqueue_scriptsincludes\class-wp-peon.php:174
actionwp_headincludes\class-wp-peon.php:176
actionwp_footerincludes\class-wp-peon.php:177
filterthe_contentincludes\class-wp-peon.php:179
Maintenance & Trust

WP Peon Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 30, 2016
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

WP Peon Developer Profile

soachishti

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Peon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-peon/css/wp-peon-admin.css/wp-content/plugins/wp-peon/js/wp-peon-admin.js
Script Paths
/wp-content/plugins/wp-peon/js/wp-peon-admin.js
Version Parameters
wp-peon-admin.css?ver=wp-peon-admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Peon