Add New Default Avatar Security & Risk Analysis

wordpress.org/plugins/add-new-default-avatar

Add new option to the Default Avatar list.

600 active installs v1.4 PHP + WP 2.8+ Updated Feb 7, 2016
avatargravatar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Add New Default Avatar Safe to Use in 2026?

Generally Safe

Score 85/100

Add New Default Avatar has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "add-new-default-avatar" plugin v1.4 exhibits a generally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events means the plugin has a minimal attack surface, and crucially, no unprotected entry points were identified. Furthermore, the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and having no recorded vulnerabilities or CVEs, suggesting a history of secure development.

However, a significant concern arises from the low percentage of properly escaped output. With only 29% of outputs being properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any data that is not properly escaped and is displayed to users could potentially be exploited by attackers to inject malicious scripts. While taint analysis showed no issues, this is likely due to the limited scope or methodology of the taint analysis performed, as the output escaping findings directly indicate a potential for unsanitized data reaching the output. The complete lack of nonce and capability checks on any potential, albeit currently non-existent, entry points is a missed opportunity for defense-in-depth.

In conclusion, the plugin's lack of attack surface and clean vulnerability history are positive indicators. However, the pervasive issue with output escaping presents a clear and present danger of XSS, significantly undermining its otherwise robust security. The absence of checks on entry points, while currently moot due to the lack of entry points, is a weakness in design philosophy.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Add New Default Avatar Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Add New Default Avatar Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

Add New Default Avatar Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterinitkl_addnewdefaultavatar.php:32
filteradmin_initkl_addnewdefaultavatar.php:36
filteravatar_defaultskl_addnewdefaultavatar.php:37
filterget_avatarkl_addnewdefaultavatar.php:38
Maintenance & Trust

Add New Default Avatar Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 7, 2016
PHP min version
Downloads49K

Community Trust

Rating100/100
Number of ratings6
Active installs600
Developer Profile

Add New Default Avatar Developer Profile

Kailey (trepmal)

12 plugins · 2K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Add New Default Avatar

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/add-new-default-avatar/anda.js
Script Paths
/wp-content/plugins/add-new-default-avatar/anda.js
Version Parameters
add-new-default-avatar/anda.js?ver=1.4

HTML / DOM Fingerprints

CSS Classes
add_new_default_avatar_add
Data Attributes
name='add_new_default_avatar'id='add_new_default_avatar'id='add_new_default_avatar_add'
JS Globals
window.ANDA
FAQ

Frequently Asked Questions about Add New Default Avatar