Amazon Box Security & Risk Analysis

wordpress.org/plugins/amazon-box

Permette di usare l'affiliazione amazon sui propri articoli

10 active installs v1.3 PHP + WP 3.0+ Updated Oct 26, 2017
affiliateamazonbox
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Amazon Box Safe to Use in 2026?

Generally Safe

Score 85/100

Amazon Box has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "amazon-box" v1.3 plugin exhibits a strong security posture in several key areas, notably lacking any documented CVEs, critical taint flows, or raw SQL queries. The absence of known vulnerabilities and the use of prepared statements for SQL indicate a responsible development approach concerning common attack vectors. Furthermore, the plugin presents a minimal attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events detected, which inherently reduces the potential for exploitation.

However, a significant concern arises from the complete lack of output escaping, affecting 100% of the identified output points. This deficiency creates a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed within the user's browser. Additionally, the absence of nonce checks and capability checks on any potential entry points, although currently limited, could become a critical issue if the attack surface were to expand or if existing entry points were discovered to be insecurely handled.

In conclusion, while the plugin's history and foundational code practices regarding SQL and attack surface are commendable, the pervasive lack of output escaping represents a critical weakness that significantly outweighs these strengths. The plugin needs immediate attention to address the XSS vulnerability. The lack of protection on existing entry points, though currently zero, also poses a latent risk.

Key Concerns

  • 100% of outputs unescaped (XSS risk)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Amazon Box Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Amazon Box Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Amazon Box Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterthe_contentAmazon Box.php:94
actionadmin_menuAmazon Box.php:232
actionadmin_initAmazon Box.php:265
Maintenance & Trust

Amazon Box Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedOct 26, 2017
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Amazon Box Developer Profile

giuseppefrattura

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Amazon Box

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/amazon-box/amazon-box.css

HTML / DOM Fingerprints

CSS Classes
amazon-boxbox-titlesign
Data Attributes
id="ab_box_1"id="ab_box_2"id="ab_box_3"id="ab_box_4"id="ab_box_5"id="ab_box_6"+3 more
Shortcode Output
<div class="amazon-box"> <box-title></div><div class="sign">Amazon-Box creato da <a href="http://www.giuseppefrattura.com">Giuseppe Frattura</a>
FAQ

Frequently Asked Questions about Amazon Box