Attributron 2000 Security & Risk Analysis

wordpress.org/plugins/attributron-2000

Easily add attribution to attachments and have them displayed on your posts.

10 active installs v1.0.0.2 PHP + WP 3.3.1+ Updated May 8, 2012
attachmentsattributioncreative-commonsimages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Attributron 2000 Safe to Use in 2026?

Generally Safe

Score 85/100

Attributron 2000 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

Based on the static analysis and vulnerability history, the 'attributron-2000' v1.0.0.2 plugin exhibits a generally positive security posture with no immediate critical risks identified. The absence of detected dangerous functions, external HTTP requests, file operations, and SQL injection vulnerabilities is a strong indicator of good development practices in these areas. Furthermore, the plugin boasts zero known CVEs and a clean vulnerability history, suggesting it has not been a target or a source of past security incidents.

However, a significant concern arises from the complete lack of output escaping. With 10 total outputs and 0% properly escaped, this presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users, if not properly sanitized, could be exploited by attackers to inject malicious scripts. Additionally, the absence of nonce checks and capability checks, while not directly indicated as an attack vector in this static analysis, leaves the plugin's entry points potentially vulnerable to unauthorized actions if an attack surface were to be discovered or introduced in future versions.

In conclusion, while the plugin has demonstrated a commendable lack of critical vulnerabilities and malicious code patterns in this analysis, the unescaped output is a glaring security weakness that requires immediate attention. Developers should prioritize implementing proper output escaping mechanisms to mitigate XSS risks. The lack of comprehensive checks on entry points also suggests a need for more robust security measures, especially if the plugin's functionality were to expand.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Attributron 2000 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Attributron 2000 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Attack Surface

Attributron 2000 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menua2k.php:24
filterthe_contenta2k.php:26
filterprepend_attachmenta2k.php:27
filterattachment_fields_to_edita2k.php:28
filterattachment_fields_to_savea2k.php:29
Maintenance & Trust

Attributron 2000 Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedMay 8, 2012
PHP min version
Downloads2K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Attributron 2000 Developer Profile

Derrick Tennant

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Attributron 2000

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/attributron-2000/a2k.css/wp-content/plugins/attributron-2000/a2k.js
Script Paths
/wp-content/plugins/attributron-2000/a2k.js

HTML / DOM Fingerprints

CSS Classes
a2k-titlea2k-copyrighta2k-authora2k-containera2k-sources
Data Attributes
data-a2k-titledata-a2k-link
FAQ

Frequently Asked Questions about Attributron 2000