
Additional Options and Tweaks Security & Risk Analysis
wordpress.org/plugins/additional-wp-tweaks-optionsAdds extra wordpress options, which are not shown in stock WordPress Dashboard [ ✅ 𝐒𝐄𝐂𝐔𝐑𝐄 𝐏𝐋𝐔𝐆𝐈𝐍𝐒 𝙗𝙮 𝙋𝙪𝙫𝙤𝙭 ]
Is Additional Options and Tweaks Safe to Use in 2026?
Generally Safe
Score 92/100Additional Options and Tweaks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "additional-wp-tweaks-options" plugin version 1.27.1 presents a mixed security posture. On the positive side, the plugin exhibits a low attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events directly exposed without authentication. Furthermore, the vast majority of SQL queries utilize prepared statements, and there is a reasonable number of nonce and capability checks in place, suggesting some awareness of WordPress security best practices.
However, several concerns warrant attention. The presence of 16 dangerous functions, including `set_time_limit`, `ini_set`, and `unserialize`, raises red flags. `unserialize` in particular is a known vector for remote code execution if used with untrusted input. The taint analysis revealing 7 flows with unsanitized paths, even without a critical or high severity finding in this specific analysis, indicates a potential for unexpected behavior or vulnerabilities if input is not strictly validated. The fact that only 56% of outputs are properly escaped is also concerning, as it opens the door to cross-site scripting (XSS) vulnerabilities.
The plugin's vulnerability history is currently clean, with no recorded CVEs. This is a strong positive indicator, suggesting a commitment to maintaining a secure codebase. However, the presence of potentially risky functions and unsanitized flows means that even without past vulnerabilities, future risks are not entirely eliminated. The plugin's strengths lie in its minimal attack surface and good SQL practices, but its weaknesses lie in the use of dangerous functions, potential for unsanitized input to lead to vulnerabilities, and insufficient output escaping.
Key Concerns
- High number of dangerous functions
- Unsanitized paths in taint flows
- Low percentage of properly escaped output
Additional Options and Tweaks Security Vulnerabilities
Additional Options and Tweaks Release Timeline
Additional Options and Tweaks Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Additional Options and Tweaks Attack Surface
WordPress Hooks 115
Maintenance & Trust
Additional Options and Tweaks Maintenance & Trust
Maintenance Signals
Community Trust
Additional Options and Tweaks Alternatives
Extra Settings for WooCommerce
extra-settings-for-woocommerce
Easily customize and enhance WooCommerce store with highly demanded settings and additional features. Includes settings for Storefront theme.
One Click Demo Import
one-click-demo-import
Import your demo content, widgets and theme settings with one click. Theme authors! Enable simple theme demo import for your users.
CMB2
cmb2
CMB2 is a metabox, custom fields, and forms library for WordPress that will blow your mind.
OptionTree
option-tree
Theme Options UI Builder for WordPress. A simple way to create & save Theme Options and Meta Boxes for free or premium themes.
Extra Product Options For WooCommerce | Custom Product Addons and Fields
woo-extra-product-options
WooCommerce Extra Product Options plugin lets you add product addons (custom products field) of 20 different field types to your product page.
Additional Options and Tweaks Developer Profile
19 plugins · 51K total installs
How We Detect Additional Options and Tweaks
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/additional-wp-tweaks-options/admin/css/general.css/wp-content/plugins/additional-wp-tweaks-options/admin/css/pages.css/wp-content/plugins/additional-wp-tweaks-options/admin/css/posttypes.css/wp-content/plugins/additional-wp-tweaks-options/admin/css/settings.css/wp-content/plugins/additional-wp-tweaks-options/admin/css/users.css/wp-content/plugins/additional-wp-tweaks-options/admin/js/general.js/wp-content/plugins/additional-wp-tweaks-options/admin/js/pages.js/wp-content/plugins/additional-wp-tweaks-options/admin/js/posttypes.js+2 moreadditional-wp-tweaks-options/admin/css/general.css?ver=additional-wp-tweaks-options/admin/css/pages.css?ver=additional-wp-tweaks-options/admin/css/posttypes.css?ver=additional-wp-tweaks-options/admin/css/settings.css?ver=additional-wp-tweaks-options/admin/css/users.css?ver=additional-wp-tweaks-options/admin/js/general.js?ver=additional-wp-tweaks-options/admin/js/pages.js?ver=additional-wp-tweaks-options/admin/js/posttypes.js?ver=additional-wp-tweaks-options/admin/js/settings.js?ver=additional-wp-tweaks-options/admin/js/users.js?ver=HTML / DOM Fingerprints
additional-wp-tweaks-options-containeradditional-wp-tweaks-options-settingsadditional-wp-tweaks-options-generaladditional-wp-tweaks-options-pagesadditional-wp-tweaks-options-posttypesadditional-wp-tweaks-options-usersadditional_wp_tweaks_options_search_highlight<!-- Begin Puvox.software --><!-- End Puvox.software -->data-puvox-optionsdata-puvox-settingsdata-puvox-page-settingsdata-puvox-posttype-settingsdata-puvox-user-settingsAdditionalWpTweaksOptionsadditionalWpTweaksOptionspuvox_settings