
WP System Information Security & Risk Analysis
wordpress.org/plugins/wp-system-infoShow WordPress Site, Current Theme, active plugin and server related information, php info, file & folder persmission at a glance.
Is WP System Information Safe to Use in 2026?
Use With Caution
Score 63/100WP System Information has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The wp-system-info plugin v1.5 presents a mixed security posture. While the static analysis shows a commendable lack of direct attack surface through common entry points like AJAX, REST API, shortcodes, and cron events, significant concerns arise from the code signals and historical vulnerability data. The presence of the `create_function` function is a red flag, as it can be exploited for arbitrary code execution if not handled with extreme care, which is compounded by the lack of any capability or nonce checks. Furthermore, the 50% of SQL queries not using prepared statements is a risk for SQL injection. The fact that one out of the two total vulnerabilities is still unpatched, and that it's a medium-severity exposure of sensitive information, is a direct indicator of ongoing risk that needs immediate attention. This historical pattern suggests potential ongoing issues with data handling and patching.
Despite the seemingly clean attack surface, the identified code signals like the use of `create_function` and the potential for SQL injection, combined with the unpatched medium vulnerability, paint a picture of a plugin that, while not overtly exposed, has underlying weaknesses. The lack of capability and nonce checks means that even if an attacker finds a way to trigger functionality, there are no built-in safeguards. The vulnerability history highlights a specific pattern of sensitive information exposure, which is a serious concern for any plugin. In conclusion, while the plugin's architecture minimizes direct attack vectors, the presence of dangerous functions, potential for SQL injection, and a persistent unpatched vulnerability significantly elevate the risk profile.
Key Concerns
- Unpatched CVE
- Dangerous function (create_function)
- SQL queries not using prepared statements (50%)
- Output escaping (52% proper)
- Missing nonce checks
- Missing capability checks
- Flows with unsanitized paths (Taint Analysis)
WP System Information Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
WP System Information <= 1.5 - Authenticated (Subscriber+) Sensitive Information Exposure
WP System Information Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
WP System Information Attack Surface
WordPress Hooks 3
Maintenance & Trust
WP System Information Maintenance & Trust
Maintenance Signals
Community Trust
WP System Information Alternatives
Site Status Reporter
site-status-reporter
Easily generate and share detailed WordPress site reports with Site Status Reporter, including plugins, themes, PHP, server info, and more—fully custo …
Ultimate Info
ultimate-info
View all server and wordpress information in quickly. This plugin is only for site administrators.
atec System Info
atec-system-info
atec System Info (Operating system, server, memory, PHP and database details)
Site Info
site-info-dashboard-widget
WordPress dashboard widget displaying the main site info.
Dashboard System Info
dashboard-system-info
Display system information on the administration dashboard page.
WP System Information Developer Profile
3 plugins · 830 total installs
How We Detect WP System Information
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-system-info/assets/css/style.css/wp-content/plugins/wp-system-info/assets/js/script.js/wp-content/plugins/wp-system-info/assets/js/script.jsHTML / DOM Fingerprints
data-nonce="bsi_nonce"BSI_Vars