All custom fields & groups Security & Risk Analysis

wordpress.org/plugins/all-custom-fields-groups

[ โœ… ๐’๐„๐‚๐”๐‘๐„ ๐๐‹๐”๐†๐ˆ๐๐’ b๐“Ž ๐’ซ๐“Š๐“‹๐‘œ๐“ ] Output all custom fields from groups

0 active installs v1.08 PHP + WP 6.0+ Updated Oct 30, 2024
acfcustomfieldsgroupshortcode
92
A ยท Safe
CVEs total1
Unpatched0
Last CVEAug 1, 2022
Safety Verdict

Is All custom fields & groups Safe to Use in 2026?

Generally Safe

Score 92/100

All custom fields & groups has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Aug 1, 2022Updated 1yr ago
Risk Assessment

The 'all-custom-fields-groups' plugin version 1.08 exhibits a mixed security posture. While it demonstrates good practices by having a zero attack surface from common entry points like AJAX handlers, REST API routes, shortcodes, and cron events, and a significant percentage of its SQL queries utilize prepared statements, several concerns warrant attention. The presence of the `unserialize` function is a significant red flag, as it can lead to deserialization vulnerabilities if not handled with extreme care. The taint analysis further amplifies this concern, revealing a high number of flows with unsanitized paths, including one of high severity, indicating potential for input manipulation to exploit vulnerabilities. Furthermore, the output escaping is only moderately effective, with over half of the outputs not being properly escaped, increasing the risk of Cross-Site Scripting (XSS) vulnerabilities. The plugin's vulnerability history, though currently showing no unpatched CVEs, includes a past medium-severity XSS vulnerability, reinforcing the importance of secure output handling and input validation. The plugin's strengths lie in its limited attack surface and proactive use of prepared statements. However, the risks associated with `unserialize`, unsanitized taint flows, and insufficient output escaping necessitate caution.

Key Concerns

  • Presence of unserialize function
  • High number of unsanitized taint flows
  • High severity taint flow found
  • Less than 100% output escaping
  • Past medium CVE (XSS)
Vulnerabilities
1

All custom fields & groups Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

WF-91e5c89e-85d3-4dda-8b79-e0b4d64e29f0-all-custom-fields-groupsmedium ยท 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

All custom fields & groups <= 1.04 - Reflected Cross-Site Scripting

Aug 1, 2022 Patched in 1.05 (540d)
Code Analysis
Analyzed Mar 17, 2026

All custom fields & groups Code Analysis

Dangerous Functions
1
Raw SQL Queries
14
46 prepared
Unescaped Output
71
79 escaped
Nonce Checks
5
Capability Checks
2
File Operations
19
External Requests
4
Bundled Libraries
0

Dangerous Functions Found

unserializeif ( @unserialize($serialized_string) !== false ) return $serialized_string;library.php:3813

SQL Query Safety

77% prepared60 total queries

Output Escaping

53% escaped150 total outputs
Data Flows
6 unsanitized

Data Flow Analysis

8 flows6 with unsanitized paths
force_redirect_to_https (library.php:103)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

All custom fields & groups Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 35
filteracf/format_value/type=textareaindex.php:81
filteracf/format_value/type=textindex.php:82
actionwp_headlibrary.php:4768
actionadmin_headlibrary.php:4769
actionwp_enqueue_scriptslibrary_wp.php:73
actionadmin_enqueue_scriptslibrary_wp.php:74
actionadmin_footerlibrary_wp.php:148
actioninitlibrary_wp.php:163
actionadmin_initlibrary_wp.php:210
filtermce_external_pluginslibrary_wp.php:212
filtermce_buttons_2library_wp.php:213
filtertiny_mce_versionlibrary_wp.php:215
actionwplibrary_wp.php:231
actionplugins_loadedlibrary_wp.php:540
actionwplibrary_wp.php:550
actionwp_footerlibrary_wp.php:700
actioninitlibrary_wp.php:711
actionwp_loadedlibrary_wp.php:854
actionshutdownlibrary_wp.php:859
actioninitlibrary_wp.php:1732
actionadmin_headlibrary_wp.php:1743
actioncurrent_screenlibrary_wp.php:1744
actionwplibrary_wp.php:1753
filterupload_mimeslibrary_wp.php:1759
filterwp_handle_uploadlibrary_wp.php:1760
actioninitlibrary_wp.php:1822
actionnetwork_admin_menulibrary_wp.php:1912
actionadmin_menulibrary_wp.php:1914
actionactivated_pluginlibrary_wp.php:1916
actionnetwork_admin_noticeslibrary_wp.php:2103
actionadmin_noticeslibrary_wp.php:2104
filterwp_php_error_messagelibrary_wp.php:2187
actionwp_footerlibrary_wp.php:2375
filterwidget_textlibrary_wp.php:2399
filtersite_transient_update_pluginslibrary_wp.php:3266
Maintenance & Trust

All custom fields & groups Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedOct 30, 2024
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

All custom fields & groups Developer Profile

Puvox Software

16 plugins ยท 51K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
540 days
View full developer profile
Detection Fingerprints

How We Detect All custom fields & groups

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/all-custom-fields-groups/assets/style.css

HTML / DOM Fingerprints

CSS Classes
acf_fieldsgrouplabelvalue
Data Attributes
data-acf_group
JS Globals
acf
Shortcode Output
[custom_fields_groups]
FAQ

Frequently Asked Questions about All custom fields & groups