WP-Sentinel Security & Risk Analysis

wordpress.org/plugins/wp-sentinel

A wordpress security system plugin which will check every HTTP request against a given set of rules to filter out malicious requests.

60 active installs v2.0.3 PHP + WP 2.8+ Updated Feb 3, 2012
exploithackidsipssecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Sentinel Safe to Use in 2026?

Generally Safe

Score 85/100

WP-Sentinel has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The wp-sentinel v2.0.3 plugin exhibits a mixed security posture. On the positive side, it has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and crucially, none of these entry points are unprotected. Furthermore, the plugin has no known CVEs in its history, indicating a generally stable and secure past. However, significant concerns arise from the static analysis. A substantial percentage of SQL queries (8%) are not using prepared statements, which could lead to SQL injection vulnerabilities. More critically, 0% of output escaping is properly done, meaning any dynamic content displayed by the plugin is vulnerable to cross-site scripting (XSS) attacks. The taint analysis reveals 5 flows with unsanitized paths, with 3 identified as high severity. This, combined with the lack of nonce checks, suggests potential for various injection attacks if these unsanitized paths are reachable through user input.

Key Concerns

  • High severity unsanitized taint flows (3)
  • Unsanitized paths in taint flows (5)
  • SQL queries without prepared statements (8%)
  • No output escaping
  • No nonce checks
Vulnerabilities
None known

WP-Sentinel Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Sentinel Code Analysis

Dangerous Functions
0
Raw SQL Queries
5
58 prepared
Unescaped Output
72
0 escaped
Nonce Checks
0
Capability Checks
5
File Operations
19
External Requests
0
Bundled Libraries
0

SQL Query Safety

92% prepared63 total queries

Output Escaping

0% escaped72 total outputs
Data Flows
5 unsanitized

Data Flow Analysis

9 flows5 with unsanitized paths
wps_admin_layouts (admin\admin.php:446)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP-Sentinel Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitwp-sentinel.php:39
actionadmin_menuwp-sentinel.php:45
actionadmin_print_scriptswp-sentinel.php:46
actionadmin_print_styleswp-sentinel.php:47
Maintenance & Trust

WP-Sentinel Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedFeb 3, 2012
PHP min version
Downloads24K

Community Trust

Rating52/100
Number of ratings5
Active installs60
Developer Profile

WP-Sentinel Developer Profile

evilsocket

1 plugin · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Sentinel

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-sentinel/admin/css/facebox.css/wp-content/plugins/wp-sentinel/admin/css/tooltip.css
Script Paths
/wp-content/plugins/wp-sentinel/admin/js/facebox.js/wp-content/plugins/wp-sentinel/admin/js/facebox-start.js/wp-content/plugins/wp-sentinel/admin/js/tooltip.js

HTML / DOM Fingerprints

HTML Comments
<!-- WP-Sentinel - Wordpress Security System . -->
Data Attributes
data-toggle="tooltip"
JS Globals
faceboxtooltip
FAQ

Frequently Asked Questions about WP-Sentinel