Adf.ly page monetarization Security & Risk Analysis

wordpress.org/plugins/adfly-website-monetarization

This plugin monetarizes your blog or website with adf.ly.

10 active installs v1.2 PHP + WP 3.0.1+ Updated Nov 19, 2015
adflylink-shortenermake-moneymonetarizationmonetarize-wordpress
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Adf.ly page monetarization Safe to Use in 2026?

Generally Safe

Score 85/100

Adf.ly page monetarization has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of 'adfly-website-monetarization' v1.2 reveals a plugin with an extremely limited attack surface. There are no identifiable entry points like AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. Furthermore, the code demonstrates good practices regarding SQL queries, exclusively using prepared statements, and shows no indication of dangerous functions, file operations, or external HTTP requests. This suggests a strong foundation in secure coding principles for these specific areas.

However, the analysis also highlights significant areas of concern. The absence of nonce checks and capability checks across all entry points (even though there are none) is a critical oversight that, if entry points were present, would leave the plugin highly vulnerable. The fact that 50% of outputs are not properly escaped presents a definite risk of Cross-Site Scripting (XSS) vulnerabilities. While the plugin has no recorded vulnerability history, this could be due to its small footprint or simply a lack of historical analysis rather than inherent security. The lack of taint analysis flows is also noted, which could mean the analysis tool did not find any flows to analyze given the limited entry points.

In conclusion, while the plugin excels in certain secure coding practices like SQL handling and has a minimal attack surface, the missing security mechanisms for potential (even if currently absent) entry points and the significant rate of unescaped output are serious weaknesses. The lack of historical vulnerabilities is encouraging but should not be relied upon as a guarantee of future security, especially given the identified code quality issues. A careful balance of strengths in core data handling and weaknesses in output sanitization and authorization checks must be considered.

Key Concerns

  • 50% of outputs are not properly escaped
  • 0 Nonce checks found
  • 0 Capability checks found
Vulnerabilities
None known

Adf.ly page monetarization Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Adf.ly page monetarization Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

Adf.ly page monetarization Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initadfly-page.php:42
actionwp_print_scriptsadfly-page.php:76
actionadmin_menuadfly-page.php:77
Maintenance & Trust

Adf.ly page monetarization Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 19, 2015
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Adf.ly page monetarization Developer Profile

carli2

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Adf.ly page monetarization

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://cdn.adf.ly/js/entry.js

HTML / DOM Fingerprints

JS Globals
adfly_idadfly_advert
FAQ

Frequently Asked Questions about Adf.ly page monetarization