Ajax Feed Reader Security & Risk Analysis

wordpress.org/plugins/ajax-feed-reader

You can add a Feed very easily.

10 active installs v1.1 beta PHP + WP 2.6+ Updated Unknown
ajaxfeedrss
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ajax Feed Reader Safe to Use in 2026?

Generally Safe

Score 100/100

Ajax Feed Reader has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'ajax-feed-reader' v1.1 beta plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices with 100% of its SQL queries using prepared statements and a high percentage of output escaping. The absence of known CVEs and a clean vulnerability history suggest a generally secure development approach regarding historical issues.

However, several concerns are raised by the static analysis. The presence of the `unserialize` function is a significant risk, as it can lead to Remote Code Execution if used with untrusted input. The complete lack of nonce checks and capability checks on entry points, particularly the shortcode, exposes the plugin to potential CSRF attacks and unauthorized actions. While the attack surface is currently small and appears to have no unprotected entry points according to the analysis, the fundamental lack of authorization checks on the shortcode is a critical oversight.

In conclusion, while the plugin has strengths in its SQL handling and output escaping, the identified risks, especially the use of `unserialize` without clear sanitization or authorization and the absence of nonce/capability checks, present a substantial security concern that needs immediate attention. The lack of a larger attack surface or historical vulnerabilities does not negate the severity of these specific code-level findings.

Key Concerns

  • Dangerous function 'unserialize' used
  • No nonce checks on entry points
  • No capability checks on entry points
  • Less than 100% output escaping
Vulnerabilities
None known

Ajax Feed Reader Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ajax Feed Reader Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
0 prepared
Unescaped Output
3
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->NP = unserialize(file_get_contents(dirname(__FILE__).'/npdata.ser'));simplepie\idn\idna_convert.class.php:98
unserialize$this->NP = unserialize(join('', file(dirname(__FILE__).'/npdata.ser')));simplepie\idn\idna_convert.class.php:100

Output Escaping

81% escaped16 total outputs
Attack Surface

Ajax Feed Reader Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[AFR] ajax_feed_reader.php:149
WordPress Hooks 1
actioninitajax_feed_reader.php:95
Maintenance & Trust

Ajax Feed Reader Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Ajax Feed Reader Developer Profile

takumin

3 plugins · 30 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ajax Feed Reader

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
AFR
REST Endpoints
/wp-json/AFR_return_json
Shortcode Output
<div class="AFR" id="afrjQuery(function(){jQuery.getJSON( 'source += '<li>';
FAQ

Frequently Asked Questions about Ajax Feed Reader