WP Server Security & Risk Analysis

wordpress.org/plugins/wp-server

Show average server load and uptime of your linux server on top in admin panel

20 active installs v2.2.3 PHP + WP 4.4+ Updated Mar 9, 2024
loadserverstatusuptime-linux
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Server Safe to Use in 2026?

Generally Safe

Score 85/100

WP Server has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'wp-server' plugin v2.2.3 presents a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries, having no recorded historical vulnerabilities, and limiting its attack surface to zero exposed entry points without authentication. The presence of nonce and capability checks, although minimal, is also a good sign. However, significant concerns arise from the static analysis, specifically the presence of dangerous functions like 'exec' and 'shell_exec'. The taint analysis revealing a flow with unsanitized paths is particularly worrying, as it indicates a potential pathway for malicious input to be executed or used in unintended ways, even if currently not flagged as critical or high severity. Furthermore, 100% of output is not properly escaped, creating a risk of cross-site scripting (XSS) vulnerabilities.

The complete absence of known vulnerabilities in its history is a positive indicator, suggesting either a history of responsible development or a lack of public discovery. However, this cannot fully offset the immediate risks identified in the code. The combination of dangerous functions and unsanitized input flows, coupled with unescaped output, represents a significant potential risk that requires immediate attention. While the plugin has strengths in its limited attack surface and SQL handling, the identified code-level risks are substantial and could be exploited if not addressed.

Key Concerns

  • Dangerous functions (exec, shell_exec) used
  • Flow with unsanitized paths
  • Output escaping: 0% properly escaped
Vulnerabilities
None known

WP Server Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Server Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

exec$serverresult = @exec('uptime');wp-server.php:88
exec$serverresult = @exec('uptime');wp-server.php:121
shell_exec$free = shell_exec('free');wp-server.php:138

Output Escaping

0% escaped4 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
nabserver_option_page (wp-server.php:169)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Server Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_initwp-server.php:28
actionadmin_menuwp-server.php:29
actionadmin_headwp-server.php:50
actionadmin_footerwp-server.php:54
actionadmin_footerwp-server.php:57
Maintenance & Trust

WP Server Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMar 9, 2024
PHP min version
Downloads10K

Community Trust

Rating96/100
Number of ratings4
Active installs20
Developer Profile

WP Server Developer Profile

nabtron

5 plugins · 1K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Server

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
nabserver_main_options_section
Data Attributes
id="wp_server_status"name="nabserver_noncename"id="nabserver_noncename"name="action_nabserver"id="submit_nabserver"
FAQ

Frequently Asked Questions about WP Server