WP Plugin Data Security & Risk Analysis

wordpress.org/plugins/wp-plugin-data

Provides abstracted data about plugins using the WordPress.org API

10 active installs v0.5 PHP + WP 2.7+ Updated Mar 5, 2009
apidatadeveloper
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Plugin Data Safe to Use in 2026?

Generally Safe

Score 85/100

WP Plugin Data has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The wp-plugin-data v0.5 plugin exhibits a strong security posture based on the provided static analysis. The code avoids dangerous functions, performs all SQL queries using prepared statements, properly escapes all outputs, and does not engage in file operations or external HTTP requests. The absence of any taint analysis findings further suggests a lack of common vulnerability patterns like unsanitized paths. The plugin also has no recorded vulnerability history, indicating a generally secure development practice and a lack of known exploits.

However, there are potential areas for improvement that contribute to a slightly reduced security score. The plugin lacks any nonce checks or capability checks. While the static analysis indicates no unprotected entry points currently, this absence of authorization mechanisms means that if new entry points were introduced or existing ones (like shortcodes) were to handle sensitive data in the future, they would be inherently vulnerable to unauthorized access. The vulnerability history being completely clear is a positive indicator, but the lack of any recorded checks makes it difficult to definitively assess its long-term security resilience.

In conclusion, wp-plugin-data v0.5 is currently in a good security state with no immediate critical or high risks identified. Its adherence to secure coding practices for SQL and output handling is commendable. The primary concern lies in the absence of authorization checks, which represents a future risk if the plugin's functionality evolves. The clean vulnerability history is a significant strength, suggesting diligent maintenance or limited exposure, but the lack of checks is a weakness that could be addressed.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Plugin Data Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Plugin Data Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

WP Plugin Data Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[wppd] fergcorp_wp-plugin-data.php:142
[wppdlink] fergcorp_wp-plugin-data.php:143
Maintenance & Trust

WP Plugin Data Maintenance & Trust

Maintenance Signals

WordPress version tested2.7.1
Last updatedMar 5, 2009
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Plugin Data Developer Profile

fergbrain

7 plugins · 1K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Plugin Data

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<a href=<a href=
FAQ

Frequently Asked Questions about WP Plugin Data