ACF Enhanced Message Field Security & Risk Analysis

wordpress.org/plugins/acf-enhanced-message-field

Adds an enhanced version of the default Message field to accept PHP and certainly no wpauto().

800 active installs v1.1.1 PHP + WP 4.0+ Updated Apr 30, 2016
acfcustom-fieldsmessagemessage-fieldphp
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ACF Enhanced Message Field Safe to Use in 2026?

Generally Safe

Score 85/100

ACF Enhanced Message Field has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The security posture of the "acf-enhanced-message-field" plugin v1.1.1 appears to be relatively strong based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, meaning the external attack surface is effectively zero. Furthermore, the plugin demonstrates good practices in its handling of SQL queries, exclusively using prepared statements, and reports no known vulnerabilities or CVEs throughout its history. This indicates a generally secure development approach.

However, a significant concern arises from the output escaping analysis. With 7 total outputs and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data rendered by the plugin could potentially be exploited by attackers to inject malicious scripts, impacting users and the integrity of the WordPress site. The absence of any nonce checks or capability checks on its entry points, while those entry points are zero, means that if any were to be introduced in future versions without proper security considerations, they would be unprotected.

In conclusion, while the plugin benefits from a lack of known vulnerabilities and a minimal attack surface, the complete lack of output escaping is a critical weakness. This oversight significantly undermines the otherwise positive security assessment and requires immediate attention. Future development should prioritize proper output sanitization for all rendered content.

Key Concerns

  • Output escaping is not implemented
Vulnerabilities
None known

ACF Enhanced Message Field Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ACF Enhanced Message Field Release Timeline

v1.1.1Current
v1.1.0
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

ACF Enhanced Message Field Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

ACF Enhanced Message Field Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionacf/include_field_typesacf-enhanced-message.php:42
actionacf/register_fieldsacf-enhanced-message.php:43
Maintenance & Trust

ACF Enhanced Message Field Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.0
Last updatedApr 30, 2016
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings7
Active installs800
Developer Profile

ACF Enhanced Message Field Developer Profile

Dreb Bitanghol

2 plugins · 810 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ACF Enhanced Message Field

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/acf-enhanced-message-field/js/input-v4.js/wp-content/plugins/acf-enhanced-message-field/js/input.js
Script Paths
/wp-content/plugins/acf-enhanced-message-field/js/input-v4.js/wp-content/plugins/acf-enhanced-message-field/js/input.js

HTML / DOM Fingerprints

CSS Classes
acf-field-object-enhanced-messagefield_type-enhanced_message
Data Attributes
data-field_keydata-key
FAQ

Frequently Asked Questions about ACF Enhanced Message Field