Allow Javascript in Text Widgets Security & Risk Analysis

wordpress.org/plugins/allow-javascript-in-text-widgets

Replaces the default text widget with one that allows Javascript so you can do basic things like add Google Ads to your sidebar without using other pl …

100 active installs v0.3 PHP + WP 3.2.1+ Updated Sep 3, 2014
filterjavascriptksestext-widgetwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Allow Javascript in Text Widgets Safe to Use in 2026?

Generally Safe

Score 85/100

Allow Javascript in Text Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'allow-javascript-in-text-widgets' plugin, version 0.3, exhibits a generally good security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal attack surface. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are positive indicators of secure coding practices. The taint analysis also reveals no identified vulnerabilities.

However, a significant concern arises from the low percentage of properly escaped output (20%). This suggests that user-supplied data or dynamic content might not be sufficiently sanitized before being displayed to users, potentially leading to Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks and capability checks on any entry points, while not directly exploitable given the zero entry points, represents a missed opportunity for robust security should the plugin evolve to include them. The vulnerability history being clean is a positive sign, implying a history of secure development or that it hasn't been a target. Overall, while the plugin's current architecture is lean and secure in many aspects, the insufficient output escaping is a notable weakness that warrants attention.

Key Concerns

  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Allow Javascript in Text Widgets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Allow Javascript in Text Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped15 total outputs
Attack Surface

Allow Javascript in Text Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initallow-javascript-in-text-widgets.php:62
Maintenance & Trust

Allow Javascript in Text Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 3, 2014
PHP min version
Downloads11K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Allow Javascript in Text Widgets Developer Profile

Philip John

7 plugins · 430 total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Allow Javascript in Text Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_text
FAQ

Frequently Asked Questions about Allow Javascript in Text Widgets