WP System Information Security & Risk Analysis

wordpress.org/plugins/wp-system-info

Show WordPress Site, Current Theme, active plugin and server related information, php info, file & folder persmission at a glance.

800 active installs v1.5 PHP 7.2+ WP 5.0+ Updated Oct 3, 2022
file-persmissionfolder-persmissionsite-infosite-informationsystem-information
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 22, 2025
Safety Verdict

Is WP System Information Safe to Use in 2026?

Use With Caution

Score 63/100

WP System Information has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 22, 2025Updated 3yr ago
Risk Assessment

The wp-system-info plugin v1.5 presents a mixed security posture. While the static analysis shows a commendable lack of direct attack surface through common entry points like AJAX, REST API, shortcodes, and cron events, significant concerns arise from the code signals and historical vulnerability data. The presence of the `create_function` function is a red flag, as it can be exploited for arbitrary code execution if not handled with extreme care, which is compounded by the lack of any capability or nonce checks. Furthermore, the 50% of SQL queries not using prepared statements is a risk for SQL injection. The fact that one out of the two total vulnerabilities is still unpatched, and that it's a medium-severity exposure of sensitive information, is a direct indicator of ongoing risk that needs immediate attention. This historical pattern suggests potential ongoing issues with data handling and patching.

Despite the seemingly clean attack surface, the identified code signals like the use of `create_function` and the potential for SQL injection, combined with the unpatched medium vulnerability, paint a picture of a plugin that, while not overtly exposed, has underlying weaknesses. The lack of capability and nonce checks means that even if an attacker finds a way to trigger functionality, there are no built-in safeguards. The vulnerability history highlights a specific pattern of sensitive information exposure, which is a serious concern for any plugin. In conclusion, while the plugin's architecture minimizes direct attack vectors, the presence of dangerous functions, potential for SQL injection, and a persistent unpatched vulnerability significantly elevate the risk profile.

Key Concerns

  • Unpatched CVE
  • Dangerous function (create_function)
  • SQL queries not using prepared statements (50%)
  • Output escaping (52% proper)
  • Missing nonce checks
  • Missing capability checks
  • Flows with unsanitized paths (Taint Analysis)
Vulnerabilities
1

WP System Information Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-57916medium · 4.3Exposure of Sensitive Information to an Unauthorized Actor

WP System Information <= 1.5 - Authenticated (Subscriber+) Sensitive Information Exposure

Sep 22, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP System Information Code Analysis

Dangerous Functions
1
Raw SQL Queries
1
1 prepared
Unescaped Output
38
41 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

create_functioncreate_function(view\php-info.php:22

SQL Query Safety

50% prepared2 total queries

Output Escaping

52% escaped79 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<status> (view\status.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP System Information Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_enqueue_scriptssystem-info.php:46
actionadmin_menusystem-info.php:59
actionplugins_loadedsystem-info.php:60
Maintenance & Trust

WP System Information Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedOct 3, 2022
PHP min version7.2
Downloads15K

Community Trust

Rating80/100
Number of ratings4
Active installs800
Developer Profile

WP System Information Developer Profile

Nurul Amin

3 plugins · 830 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP System Information

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-system-info/assets/css/style.css/wp-content/plugins/wp-system-info/assets/js/script.js
Script Paths
/wp-content/plugins/wp-system-info/assets/js/script.js

HTML / DOM Fingerprints

Data Attributes
data-nonce="bsi_nonce"
JS Globals
BSI_Vars
FAQ

Frequently Asked Questions about WP System Information