Adrotate Extra Settings Security & Risk Analysis

wordpress.org/plugins/adrotate-extra-settings

Ultra light plugin for Wordpress that add new tiny features to AdRotate/AdRotate Pro (not affiliated)

50 active installs v1.2.0 PHP + WP 4.7+ Updated Feb 14, 2018
adadrotateadsbanner
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Adrotate Extra Settings Safe to Use in 2026?

Generally Safe

Score 85/100

Adrotate Extra Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "adrotate-extra-settings" v1.2.0 plugin exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events with unauthenticated access significantly limits the potential attack surface. Furthermore, the code shows no direct vulnerabilities like dangerous functions, raw SQL queries, file operations, or external HTTP requests. The fact that all SQL queries utilize prepared statements is a positive indicator of secure database interaction.

However, a significant concern arises from the low percentage (27%) of properly escaped output. This suggests a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where unsanitized data could be rendered directly in the browser, potentially leading to code execution or session hijacking. The absence of any recorded vulnerability history is positive, but it does not negate the risks identified in the code analysis. The plugin's security relies heavily on the absence of exploitable entry points, and the unescaped output represents a notable weakness that could be exploited if any data manipulation is possible.

In conclusion, while the plugin avoids common pitfalls like unpatched CVEs and insecure direct database access, the high likelihood of XSS vulnerabilities due to insufficient output escaping is a critical concern. The limited attack surface is a strength, but it's overshadowed by the potential for client-side attacks. A thorough review and remediation of output escaping mechanisms are strongly recommended to improve its overall security.

Key Concerns

  • Insufficient output escaping (27% proper)
Vulnerabilities
None known

Adrotate Extra Settings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Adrotate Extra Settings Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

27% escaped11 total outputs
Attack Surface

Adrotate Extra Settings Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_initadmin\class-adrotate-extra-settings-admin.php:49
actionadmin_menuadmin\class-adrotate-extra-settings-admin.php:51
actionadmin_headadmin\class-adrotate-extra-settings-admin.php:62
actionadmin_headadmin\class-adrotate-extra-settings-admin.php:67
actionadmin_headadmin\class-adrotate-extra-settings-admin.php:71
actionadmin_headadmin\class-adrotate-extra-settings-admin.php:77
actionplugins_loadedadrotate-extra-settings.php:46
Maintenance & Trust

Adrotate Extra Settings Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 14, 2018
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs50
Developer Profile

Adrotate Extra Settings Developer Profile

Daniele Scasciafratte

4 plugins · 2K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
181 days
View full developer profile
Detection Fingerprints

How We Detect Adrotate Extra Settings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Adrotate Extra Settings