Web Server Information Security & Risk Analysis

wordpress.org/plugins/wpheka-web-server-information

Web Server Information plugin will give you detailed information about your hosting server's configuration and installed modules.

30 active installs v1.7 PHP + WP 4.8+ Updated Feb 12, 2026
phpphp-infoserver-informationserver-stats
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Web Server Information Safe to Use in 2026?

Generally Safe

Score 100/100

Web Server Information has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The wpheka-web-server-information plugin v1.7 exhibits a mixed security posture. While the attack surface appears to be zero, and all SQL queries utilize prepared statements, several concerning code signals are present. The use of `unserialize` without apparent sanitization or input validation is a significant risk, as it can lead to Remote Code Execution (RCE) if malicious serialized data is processed. Furthermore, only 26% of output is properly escaped, indicating a potential for Cross-Site Scripting (XSS) vulnerabilities. The presence of two flows with unsanitized paths in the taint analysis also raises red flags, suggesting that user-supplied data might be processed in a way that could be exploited. The plugin's vulnerability history is clean, with no known CVEs, which is a positive indicator. However, the internal code signals of concern, particularly the `unserialize` function and the taint analysis results, suggest that the plugin's security relies heavily on the assumption that its inputs are always trusted, which is rarely the case in real-world scenarios. The lack of nonce checks and capability checks on potential entry points (even if currently zero) is also a weakness that could become a vulnerability if new entry points are introduced.

Key Concerns

  • Dangerous function 'unserialize' used
  • Low percentage of properly escaped output
  • Flows with unsanitized paths found
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Web Server Information Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Web Server Information Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
10 prepared
Unescaped Output
17
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$query = @unserialize( wp_remote_retrieve_body( wp_remote_get( 'http://ip-api.com/php/' . $ip ) ) );includes\class-wpheka-info-admin-webserver.php:109

SQL Query Safety

100% prepared10 total queries

Output Escaping

26% escaped23 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
__construct (includes\class-wpheka-info-admin-webserver.php:31)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Web Server Information Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menuincludes\class-wpheka-web-server-info-admin.php:44
actionadmin_enqueue_scriptsincludes\class-wpheka-web-server-info-admin.php:47
actioninfo_page_webserver_tab_initincludes\class-wpheka-web-server-info-admin.php:50
actioninfo_page_phpinfo_tab_initincludes\class-wpheka-web-server-info-admin.php:51
actioninfo_page_dbinfo_tab_initincludes\class-wpheka-web-server-info-admin.php:52
filterupdate_footerincludes\class-wpheka-web-server-info-admin.php:55
actionplugins_loadedwpheka-web-server-information.php:44
actionadmin_noticeswpheka-web-server-information.php:51
actionadmin_initwpheka-web-server-information.php:104
Maintenance & Trust

Web Server Information Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 12, 2026
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Web Server Information Developer Profile

akshayaswaroop

4 plugins · 2K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Web Server Information

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpheka-web-server-information/assets/css/admin.css
Version Parameters
wpheka-web-server-information/assets/css/admin.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Web Server Information