Additional Content Security & Risk Analysis

wordpress.org/plugins/additional-content

Display additional content before or after post content in single post pages.

10 active installs v1.3.0 PHP + WP 4.0+ Updated Apr 7, 2020
contenteditpostpost-contentpublish
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Additional Content Safe to Use in 2026?

Generally Safe

Score 85/100

Additional Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'additional-content' plugin version 1.3.0 exhibits a generally strong security posture. The absence of any identified attack surface entry points (AJAX, REST API, shortcodes, cron events) is a significant positive indicator, suggesting a limited exposure to external manipulation. Furthermore, the complete absence of known vulnerabilities, including critical and high severity ones, and the use of prepared statements for all SQL queries demonstrate good development practices. The presence of nonce and capability checks also contributes positively.

However, a notable concern arises from the output escaping. With 37 total outputs and only 19% properly escaped, there is a significant risk of Cross-Site Scripting (XSS) vulnerabilities. This means that data processed and displayed by the plugin might not be sufficiently sanitized, allowing attackers to inject malicious scripts. While taint analysis shows no flows with unsanitized paths, this is based on zero flows analyzed, which might indicate an incomplete analysis or a very simple plugin.

In conclusion, the plugin benefits from a lack of known vulnerabilities and a controlled attack surface. The main weakness lies in the insufficient output escaping, which presents a tangible risk of XSS. Future development should prioritize addressing this output sanitization gap. The limited taint analysis is also a potential area for deeper investigation if the plugin's functionality warrants it.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Additional Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Additional Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
30
7 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

19% escaped37 total outputs
Attack Surface

Additional Content Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 19
filterthe_contentincludes\class-public.php:126
actionadmin_noticesincludes\class-update-php.php:78
actionnetwork_admin_noticesincludes\class-update-php.php:79
filterthe_additional_contentincludes\filters.php:26
filterthe_additional_contentincludes\filters.php:27
filterthe_additional_contentincludes\filters.php:28
filterthe_additional_contentincludes\filters.php:29
filterthe_additional_contentincludes\filters.php:30
filterthe_additional_contentincludes\filters.php:31
filterthe_additional_contentincludes\filters.php:32
filterthe_additional_contentincludes\filters.php:33
actionwpincludes\install.php:50
actionload-post.phpincludes\install.php:76
actionload-post-new.phpincludes\install.php:77
actionadd_meta_boxesincludes\metaboxes.php:149
actionadmin_print_footer_scriptsincludes\metaboxes.php:268
filterredirect_post_locationincludes\metaboxes.php:308
actionsave_postincludes\metaboxes.php:332
actionadmin_enqueue_scriptsincludes\scripts.php:54
Maintenance & Trust

Additional Content Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 7, 2020
PHP min version
Downloads7K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Additional Content Developer Profile

keesiemeijer

6 plugins · 11K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Additional Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/additional-content/includes/assets/js/additional-content.min.js
Script Paths
/wp-content/plugins/additional-content/includes/assets/js/additional-content.min.js
Version Parameters
additional-content/style.css?ver=additional-content/includes/assets/js/additional-content.min.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- additional-content -->
Data Attributes
data-iddata-nonce
JS Globals
ac_additional_content
Shortcode Output
[additional-content]
FAQ

Frequently Asked Questions about Additional Content