
Back End Instructions Security & Risk Analysis
wordpress.org/plugins/back-end-instructionsPlugin for WordPress developers to provide easy "how to use" instructions to their clients.
Is Back End Instructions Safe to Use in 2026?
Generally Safe
Score 85/100Back End Instructions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'back-end-instructions' plugin version 3.1.1 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and boasts a clean history, suggesting a generally well-maintained codebase regarding public exploits. The static analysis also indicates a very small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. Furthermore, the plugin demonstrates good practices in its use of prepared statements for SQL queries, with 92% of them being secure. It also includes a nonce check and a reasonable number of capability checks.
However, there are significant concerns regarding the code quality and security implementation. The presence of four instances of the `create_function` dangerous function is a red flag, as this is often associated with security vulnerabilities if not handled with extreme care. The most concerning aspect is the very low percentage of properly escaped output (20%). This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied or dynamic data is likely being outputted to the browser without sufficient sanitization. While taint analysis found no specific unsanitized flows, the general lack of output escaping is a systemic issue that could lead to vulnerabilities.
In conclusion, while the plugin has an excellent track record with no past vulnerabilities and a minimal attack surface, the extensive use of the dangerous `create_function` and the severely inadequate output escaping are significant weaknesses. The plugin developer needs to prioritize refactoring the code to eliminate `create_function` and implement robust output escaping across all dynamic content. The current implementation, despite its clean history, carries a substantial risk of XSS vulnerabilities.
Key Concerns
- Dangerous function: create_function used
- Low percentage of properly escaped output
- Limited capability checks
Back End Instructions Security Vulnerabilities
Back End Instructions Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Back End Instructions Attack Surface
WordPress Hooks 12
Maintenance & Trust
Back End Instructions Maintenance & Trust
Maintenance Signals
Community Trust
Back End Instructions Alternatives
WP Help
wp-help
Site operators can create detailed, hierarchical documentation for the site's authors, editors, and contributors, viewable in the WordPress admin …
Help Manager
help-manager
Create documentation for the site's authors, editors, and contributors viewable in the WordPress admin and avoid repeated "how-to" questions.
EmbedPress – PDF Embedder, Embed YouTube Videos, 3D FlipBook, Social feeds, Docs & more
embedpress
EmbedPress lets you embed videos, pages, social feeds, embed PDF 3D flipbooks & other content on WordPress without coding & enhance storytelling.
BetterDocs – Knowledge Base Docs & FAQ Solution for Elementor & Block Editor
betterdocs
A full-featured documentation plugin including AI writing assistance to create knowledge bases, docs, FAQs, wikis, and more with easy drag & drop UI.
Helpie FAQ — Accordion, Docs & Knowledge Base
helpie-faq
Accordion , FAQ & Docs builder with Drag and Drop features. Helpie Accordion FAQ plugin works with Helpie Knowledge Base , Woocommerce & Elementor
Back End Instructions Developer Profile
1 plugin · 30 total installs
How We Detect Back End Instructions
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/back-end-instructions/css/style.css/wp-content/plugins/back-end-instructions/js/admin.js/wp-content/plugins/back-end-instructions/js/admin.jsback-end-instructions/css/style.css?ver=back-end-instructions/js/admin.js?ver=