Bible Reading Plan Security & Risk Analysis

wordpress.org/plugins/bible-reading-plan

Lead your readers through the Bible in a year with this sidebar widget.

20 active installs v0.2 PHP + WP 2.5.1+ Updated May 8, 2009
bibledailydevotionscripture
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bible Reading Plan Safe to Use in 2026?

Generally Safe

Score 85/100

Bible Reading Plan has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "bible-reading-plan" plugin v0.2 presents a mixed security posture. While the static analysis reveals a very small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, and a clean vulnerability history with zero known CVEs, significant concerns arise from the code signals. A notable weakness is that 100% of the 14 observed output operations are not properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis shows two flows with unsanitized paths, suggesting potential security weaknesses that could be exploited if an entry point were discovered. The lack of any capability checks or nonce checks on the observed code, while not directly tied to an entry point in this analysis, is a concerning pattern for broader security practices.

Key Concerns

  • All observed outputs are unescaped
  • Taint analysis found unsanitized paths
  • No capability checks observed
  • No nonce checks observed
Vulnerabilities
None known

Bible Reading Plan Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Bible Reading Plan Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
6 prepared
Unescaped Output
14
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared6 total queries

Output Escaping

0% escaped14 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ft_brp_widget_controll (widget.php:39)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Bible Reading Plan Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedwidget.php:112
Maintenance & Trust

Bible Reading Plan Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedMay 8, 2009
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Bible Reading Plan Developer Profile

Glenn Ansley

7 plugins · 670 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bible Reading Plan

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bible-reading-plan/css/ft_bible_reading_plan.css/wp-content/plugins/bible-reading-plan/js/ft_bible_reading_plan.js
Script Paths
/wp-content/plugins/bible-reading-plan/js/ft_bible_reading_plan.js
Version Parameters
bible-reading-plan/css/ft_bible_reading_plan.css?ver=bible-reading-plan/js/ft_bible_reading_plan.js?ver=

HTML / DOM Fingerprints

CSS Classes
ft_bible_reading_plan_widget
HTML Comments
Copyright 2009 Glenn Ansley
JS Globals
FT_BRP_Version
FAQ

Frequently Asked Questions about Bible Reading Plan