WP Security Log Security & Risk Analysis

wordpress.org/plugins/wp-security-log

WP Security Log maintains a log of attempts to break security through 404 error page requests and failed login attempts and provides a convenient mean …

10 active installs v1.0 PHP + WP 3.3+ Updated Mar 11, 2013
error-404error-loglogin-failurewp_list_table
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Security Log Safe to Use in 2026?

Generally Safe

Score 85/100

WP Security Log has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "wp-security-log" v1.0 plugin exhibits a generally good security posture with no known historical vulnerabilities and a strong emphasis on secure coding practices in static analysis. The absence of dangerous functions, the use of prepared statements for all SQL queries, and the presence of numerous nonce checks are significant strengths. The plugin also avoids external HTTP requests and bundling libraries, reducing potential attack vectors.

However, the analysis reveals areas for concern. A notable finding is the presence of two "flows with unsanitized paths" in the taint analysis, which could indicate potential vulnerabilities if these paths are exposed to user input and lead to unintended file operations or path traversal. Additionally, the extremely low percentage of properly escaped output (6%) is a major red flag. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, as data displayed to users is likely not being sanitized, allowing attackers to inject malicious scripts.

While the plugin has no recorded vulnerability history, this does not guarantee future safety, especially given the identified output escaping issues. The lack of capability checks on any entry points, though the entry points themselves are currently zero, presents a future risk if new entry points are added without proper authorization checks. In conclusion, "wp-security-log" v1.0 has strong foundations in secure development but suffers from critical output escaping deficiencies and potential path sanitization issues that require immediate attention.

Key Concerns

  • Unsanitized paths found in taint analysis
  • Low percentage of properly escaped output
  • No capability checks on entry points
Vulnerabilities
None known

WP Security Log Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Security Log Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
34
2 escaped
Nonce Checks
13
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

6% escaped36 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

6 flows2 with unsanitized paths
wpseclog_error_404_display_log (includes\error-404-log.php:46)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Security Log Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionwp_headincludes\error-404-log.php:11
actionadmin_initincludes\error-404-log.php:112
actionwp_login_failedincludes\login-attack-log.php:11
actionadmin_initincludes\login-attack-log.php:100
actionadmin_initwp-security-log.php:83
actionadmin_menuwp-security-log.php:84
filterplugin_row_metawp-security-log.php:115
filterset-screen-optionwp-security-log.php:181
Maintenance & Trust

WP Security Log Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMar 11, 2013
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Security Log Developer Profile

Terry O'Brien (HoosierDragon)

3 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Security Log

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-security-log/images/log-16.png
Script Paths
/wp-content/plugins/wp-security-log/js/wp-security-log-menu.js/wp-content/plugins/wp-security-log/js/wp-security-log-postbox.js/wp-content/plugins/wp-security-log/js/jquery.validate.js/wp-content/plugins/wp-security-log/js/additional-methods.js/wp-content/plugins/wp-security-log/js/wp-security-log-file.js/wp-content/plugins/wp-security-log/js/wp-security-log-close.js

HTML / DOM Fingerprints

CSS Classes
update-pluginscount-plugin-count
HTML Comments
Copyright 2013, Terry O'BrienUsing array_unshift puts the Settings link at the start of the sequenceUsing array_push puts the Download and Donate link at the end of the sequenceUse basename for parent sub-directory name and file name, must be same+2 more
FAQ

Frequently Asked Questions about WP Security Log