A Random Number Security & Risk Analysis

wordpress.org/plugins/a-random-number

A WordPress plugin that displays a random number on each page load via shortcode. It truly is magic.

900 active installs v1.2 PHP + WP 3.0.1+ Updated Jul 31, 2024
randomrandom-numberrandom-number-generatorrng
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is A Random Number Safe to Use in 2026?

Generally Safe

Score 92/100

A Random Number has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'a-random-number' plugin v1.2 exhibits a generally positive security posture, with no known vulnerabilities in its history and a static analysis that highlights several good security practices. The code demonstrates a commitment to secure SQL query handling by using prepared statements exclusively and ensures all output is properly escaped. The absence of file operations and external HTTP requests further reduces the potential attack vectors. The plugin also incorporates capability checks, indicating an effort to restrict access to certain functionalities. However, a significant concern arises from the presence of the `unserialize` function, which, when combined with other factors, can introduce deserialization vulnerabilities if not handled with extreme care and proper input validation.

While the current static analysis shows no critical or high-severity taint flows, this does not entirely mitigate the risk associated with `unserialize`. The absence of nonce checks on the single shortcode entry point is also a point of potential weakness, as it could be exploited in certain cross-site request forgery (CSRF) scenarios if the shortcode's functionality is sensitive. The plugin's clean vulnerability history is a strong positive, suggesting a well-maintained codebase or a low profile. However, the presence of `unserialize` and the lack of nonce checks on the shortcode prevent a fully secure assessment.

Key Concerns

  • Dangerous function unserialize detected
  • Shortcode lacks nonce check
Vulnerabilities
None known

A Random Number Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

A Random Number Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$options = unserialize($options);a-random-number.php:107
Attack Surface

A Random Number Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[arandomnumber] a-random-number.php:31
WordPress Hooks 4
actionadmin_heada-random-number.php:34
filtermce_external_pluginsa-random-number.php:47
filtermce_buttonsa-random-number.php:48
actionadmin_print_footer_scriptsa-random-number.php:139
Maintenance & Trust

A Random Number Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedJul 31, 2024
PHP min version
Downloads14K

Community Trust

Rating74/100
Number of ratings6
Active installs900
Developer Profile

A Random Number Developer Profile

James Harrison

1 plugin · 900 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect A Random Number

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/a-random-number/arandomnumber-button.js

HTML / DOM Fingerprints

Data Attributes
data-num='0'
JS Globals
QTags
Shortcode Output
[arandomnumber[arandomnumber min=[arandomnumber max=[arandomnumber min=1 max=100]
FAQ

Frequently Asked Questions about A Random Number