
Amazing Widgets Security & Risk Analysis
wordpress.org/plugins/amazing-widgetsAmazing Widgets contains some useful widgets to extend your WordPress site. It is a free plugin that will work with ANY theme.
Is Amazing Widgets Safe to Use in 2026?
Generally Safe
Score 85/100Amazing Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "amazing-widgets" v1.0.0 plugin presents a mixed security posture. On the positive side, it shows no known vulnerabilities (CVEs) and a clean taint analysis, indicating no immediate critical or high-severity flaws related to data flow manipulation. The complete absence of external HTTP requests, cron events, shortcodes, and REST API routes with permission checks, as well as AJAX handlers, significantly limits the plugin's attack surface in these common areas. Furthermore, all SQL queries, though present, are correctly implemented using prepared statements, mitigating risks of SQL injection.
However, several concerning signals emerge from the static code analysis. The presence of the `create_function` construct is a significant red flag, as it's a deprecated and potentially insecure way to execute code dynamically, often leading to vulnerabilities if not handled with extreme care and rigorous input validation, which is not evident here. The fact that only 22% of output is properly escaped suggests a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the large number of output operations (246). The absence of any nonce checks or capability checks on entry points, while the attack surface is currently reported as zero, is a latent risk. If any entry points are ever introduced or exposed, they will be entirely unprotected.
In conclusion, while the plugin has avoided historical vulnerabilities and has good practices in SQL handling and external requests, the use of `create_function` and widespread lack of output escaping are significant weaknesses. The lack of any authorization checks on potential entry points, even if none are currently defined, is a critical oversight that could be exploited if the plugin evolves. The overall risk is moderate, with a high potential for XSS and code execution vulnerabilities due to insecure coding practices.
Key Concerns
- Dangerous function create_function used
- Low percentage of properly escaped output
- No nonce checks
- No capability checks
Amazing Widgets Security Vulnerabilities
Amazing Widgets Code Analysis
Dangerous Functions Found
Output Escaping
Amazing Widgets Attack Surface
WordPress Hooks 13
Maintenance & Trust
Amazing Widgets Maintenance & Trust
Maintenance Signals
Community Trust
Amazing Widgets Alternatives
Smash Balloon Social Photo Feed – Easy Social Feeds Plugin
instagram-feed
Formerly "Instagram Feed". Display clean, customizable, and responsive Instagram feeds from multiple accounts. Supports Instagram oEmbeds.
Prime Slider – Addons for Elementor
bdthemes-prime-slider-lite
Create responsive sliders using Elementor for hero sections, posts, logos, images, products, testimonials, and more.
Social Icons Widget & Block – Social Media Icons & Share Buttons
social-icons-widget-by-wpzoom
Social media icons plugin for WordPress - Add 400+ social icons and share buttons. Gutenberg block, widget & Elementor support. GDPR compliant.
Social Feed Gallery
insta-gallery
Formerly known as "Instagram Feed", this is the best plugin for displaying Instagram feeds on WordPress. It also supports Instagram reels.
Simple Author Box
simple-author-box
Add a responsive author box or guest author box with social icons to any post. Great author box for any site!
Amazing Widgets Developer Profile
3 plugins · 810 total installs
How We Detect Amazing Widgets
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/amazing-widgets/lib/settings/admin-style.css/wp-content/plugins/amazing-widgets/style.css/wp-content/plugins/amazing-widgets/lib/font-awesome/css/font-awesome.min.css/wp-content/plugins/amazing-widgets/lib/flexslider/flexslider.css/wp-content/plugins/amazing-widgets/lib/flexslider/jquery.flexslider-min.js/wp-content/plugins/amazing-widgets/lib/scripts.js/wp-content/plugins/amazing-widgets/lib/settings/wp-settings-framework.php/wp-content/plugins/amazing-widgets/inc/class-social-widget.php/wp-content/plugins/amazing-widgets/inc/class-twitter-widget.php/wp-content/plugins/amazing-widgets/inc/class-post-tabs-widget.php/wp-content/plugins/amazing-widgets/inc/class-content-slider-widget.php/wp-content/plugins/amazing-widgets/inc/class-timeline-posts-widget.php+1 moreamazing-widgets/style.css?ver=amazing-widgets/lib/font-awesome/css/font-awesome.min.css?ver=amazing-widgets/lib/flexslider/flexslider.css?ver=amazing-widgets/lib/flexslider/jquery.flexslider-min.js?ver=amazing-widgets/lib/scripts.js?ver=HTML / DOM Fingerprints
aw_settings_containeraw_gray<!-- Block direct requests/* Setup Constants/* Init Plugin/* Load style file for wp-admin/widgets.php+7 moreid="aw_content_slider"name="aw_content_slider"id="aw_settings_container"id="aw_general_fontawesome"name="aw_general_fontawesome"window.aw_widgets