Aye Aye Frame Security & Risk Analysis

wordpress.org/plugins/aye-aye-frame

Allows the use of iframes in your blog using a custom shortcode

10 active installs v1 PHP + WP 3.0+ Updated Sep 20, 2011
htmliframestrip-tags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Aye Aye Frame Safe to Use in 2026?

Generally Safe

Score 85/100

Aye Aye Frame has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The aye-aye-frame plugin v1 exhibits a generally strong security posture based on the static analysis. It demonstrates good practices by having no dangerous functions, all SQL queries utilize prepared statements, and all outputs are properly escaped. Furthermore, the absence of file operations and external HTTP requests minimizes common attack vectors. The plugin also appears to implement capability checks for its single entry point, which is positive. The vulnerability history is clean, with no recorded CVEs, suggesting a history of secure development or a lack of prior security scrutiny.

However, the analysis reveals a notable absence of nonce checks. While capability checks are present on the shortcode, the lack of nonce checks could leave this entry point susceptible to Cross-Site Request Forgery (CSRF) attacks if the shortcode's functionality involves state-changing operations. The total lack of taint analysis results is also a point of concern, as it implies that the analysis might not have been comprehensive enough to detect potential flaws, or that the plugin is indeed very simple and lacks complex data flows. Overall, the plugin is well-coded in terms of common web vulnerabilities, but the missing nonce check is a specific area for improvement and potential risk.

Despite the positive static analysis, the absence of nonce checks on the shortcode presents a moderate risk. While no critical vulnerabilities are evident from the provided data, a CSRF vulnerability could still be exploited if the shortcode performs sensitive actions. The plugin's clean vulnerability history is a positive indicator, but it does not negate the need for robust security practices like proper nonce implementation. The lack of reported taint flows is unusual and might suggest either a very simple plugin or a limitation in the analysis performed. Therefore, the plugin is considered relatively secure, but the CSRF risk due to missing nonce checks needs to be addressed.

Key Concerns

  • Missing nonce checks on shortcode
Vulnerabilities
None known

Aye Aye Frame Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Aye Aye Frame Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Aye Aye Frame Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ayeframe] aye-aye-frame.php:74
WordPress Hooks 1
actionadmin_menuaye-aye-frame.php:10
Maintenance & Trust

Aye Aye Frame Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 20, 2011
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Aye Aye Frame Developer Profile

utcwebdesign

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Aye Aye Frame

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<iframe width="250" height="250" frameborder="0" marginheight="0" marginwidth="0" name="" scrolling="auto" id="" class="" title="" src="
FAQ

Frequently Asked Questions about Aye Aye Frame