Append Content Security & Risk Analysis

wordpress.org/plugins/append-content

Ever wanted to add a snippet of text below the content of your posts/pages?

40 active installs v2.1.1 PHP 7.4+ WP 5.3+ Updated Jul 31, 2023
contentcopyrightpress-releases
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 1, 2025
Download
Safety Verdict

Is Append Content Safe to Use in 2026?

Use With Caution

Score 64/100

Append Content has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 1, 2025Updated 2yr ago
Risk Assessment

The 'append-content' plugin v2.1.1 exhibits a mixed security posture. On the positive side, the static analysis shows a very small attack surface with no identifiable AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all detected SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are good security practices. However, a significant concern arises from the output escaping analysis, where 100% of outputs are not properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website. The taint analysis also reveals two flows with unsanitized paths, which, while not classified as critical or high severity, warrant investigation for potential path traversal or information disclosure vulnerabilities. The vulnerability history is particularly worrying, with one unpatched medium severity CVE related to Cross-Site Request Forgery (CSRF). This suggests a pattern of the plugin being susceptible to certain types of attacks, and the failure to patch a known vulnerability is a direct and serious security risk.

Key Concerns

  • Unpatched CVE
  • No output escaping
  • Unsanitized paths in taint flows
Vulnerabilities
1

Append Content Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31780medium · 4.3Cross-Site Request Forgery (CSRF)

Append Content <= 2.1.1 - Cross-Site Request Forgery to Settings Update

Apr 1, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Append Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
main (append-content.php:93)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Append Content Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Append Content Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedJul 31, 2023
PHP min version7.4
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Append Content Developer Profile

Andy Stratton

4 plugins · 2K total installs

90
trust score
Avg Security Score
85/100
Avg Patch Time
2 days
View full developer profile
Detection Fingerprints

How We Detect Append Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="apc_publish"name="apc_omit_home"name="apc_omit_front"name="apc_omit_cat"name="apc_omit_tag"name="apc_omit_date"+2 more
FAQ

Frequently Asked Questions about Append Content