
WP Security Log Security & Risk Analysis
wordpress.org/plugins/wp-security-logWP Security Log maintains a log of attempts to break security through 404 error page requests and failed login attempts and provides a convenient mean …
Is WP Security Log Safe to Use in 2026?
Generally Safe
Score 85/100WP Security Log has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-security-log" v1.0 plugin exhibits a generally good security posture with no known historical vulnerabilities and a strong emphasis on secure coding practices in static analysis. The absence of dangerous functions, the use of prepared statements for all SQL queries, and the presence of numerous nonce checks are significant strengths. The plugin also avoids external HTTP requests and bundling libraries, reducing potential attack vectors.
However, the analysis reveals areas for concern. A notable finding is the presence of two "flows with unsanitized paths" in the taint analysis, which could indicate potential vulnerabilities if these paths are exposed to user input and lead to unintended file operations or path traversal. Additionally, the extremely low percentage of properly escaped output (6%) is a major red flag. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, as data displayed to users is likely not being sanitized, allowing attackers to inject malicious scripts.
While the plugin has no recorded vulnerability history, this does not guarantee future safety, especially given the identified output escaping issues. The lack of capability checks on any entry points, though the entry points themselves are currently zero, presents a future risk if new entry points are added without proper authorization checks. In conclusion, "wp-security-log" v1.0 has strong foundations in secure development but suffers from critical output escaping deficiencies and potential path sanitization issues that require immediate attention.
Key Concerns
- Unsanitized paths found in taint analysis
- Low percentage of properly escaped output
- No capability checks on entry points
WP Security Log Security Vulnerabilities
WP Security Log Code Analysis
Output Escaping
Data Flow Analysis
WP Security Log Attack Surface
WordPress Hooks 8
Maintenance & Trust
WP Security Log Maintenance & Trust
Maintenance Signals
Community Trust
WP Security Log Alternatives
301 Redirects – Redirect Manager
eps-301-redirects
Manage 301 & 302 redirects. Simple redirection & redirects validation. Includes redirect stats & 404 error log.
Simple 301 Redirects By BetterLinks – Easy WordPress Redirect Manager for Redirects, 404 Error Log & More
simple-301-redirects
Simple 301 Redirects provides an easy method of redirecting requests to another page on your site or elsewhere on the web.
301 Redirects & 404 Error Log
301-redirects
Create & manage 301 redirects. Easily test redirects. Includes 404 error log.
Error Log Viewer by BestWebSoft
error-log-viewer
Get latest error log messages to diagnose website problems. Define and fix issues faster.
Debug
debug
Debug can help you to find errors in your wordpress website via editing wp-config.php file and email notification.
WP Security Log Developer Profile
3 plugins · 80 total installs
How We Detect WP Security Log
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-security-log/images/log-16.png/wp-content/plugins/wp-security-log/js/wp-security-log-menu.js/wp-content/plugins/wp-security-log/js/wp-security-log-postbox.js/wp-content/plugins/wp-security-log/js/jquery.validate.js/wp-content/plugins/wp-security-log/js/additional-methods.js/wp-content/plugins/wp-security-log/js/wp-security-log-file.js/wp-content/plugins/wp-security-log/js/wp-security-log-close.jsHTML / DOM Fingerprints
update-pluginscount-plugin-countCopyright 2013, Terry O'BrienUsing array_unshift puts the Settings link at the start of the sequenceUsing array_push puts the Download and Donate link at the end of the sequenceUse basename for parent sub-directory name and file name, must be same+2 more