BinaryM CMS Pack Security & Risk Analysis

wordpress.org/plugins/binarym-cms-pack

A collection of functions, shortcodes and a widget that we find useful for our client projects.

10 active installs v0.1.0 PHP + WP 2.7+ Updated Feb 5, 2012
awesomebinarymcms
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is BinaryM CMS Pack Safe to Use in 2026?

Generally Safe

Score 85/100

BinaryM CMS Pack has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The plugin "binarym-cms-pack" v0.1.0 exhibits a mixed security posture. On the positive side, there are no known CVEs, no dangerous functions, and the single SQL query uses prepared statements. Taint analysis also reports no critical or high severity flows. This suggests a foundational level of security consciousness in these specific areas.

However, significant concerns arise from the static analysis. A complete lack of output escaping is a major red flag, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if any of the shortcode outputs are user-controllable or dynamically generated. Furthermore, the absence of nonce checks and capability checks across all entry points, especially the shortcodes, exposes the plugin to potential Cross-Site Request Forgery (CSRF) attacks or unauthorized execution of actions that might not have direct authentication checks present. The lack of vulnerability history, while seemingly positive, could also indicate a lack of thorough security testing or a very new, less scrutinized plugin.

In conclusion, while the plugin avoids common pitfalls like raw SQL and dangerous functions, the critical flaw in output escaping and the general lack of authorization checks on its shortcodes present a substantial risk. The absence of any vulnerability history is not a strong indicator of security in this context, and the focus should be on addressing the identified code-level weaknesses.

Key Concerns

  • 0% output escaping
  • 0 capability checks on entry points
  • 0 nonce checks on entry points
Vulnerabilities
None known

BinaryM CMS Pack Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

BinaryM CMS Pack Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped10 total outputs
Attack Surface

BinaryM CMS Pack Attack Surface

Entry Points5
Unprotected0

Shortcodes 5

[links] binarym-cms.php:15
[childpages] binarym-cms.php:46
[postsby] binarym-cms.php:102
[files] binarym-cms.php:152
[iframe] binarym-cms.php:178
WordPress Hooks 3
filterattachment_fields_to_editbinarym-cms.php:258
filterattachment_fields_to_savebinarym-cms.php:276
actionwidgets_initwidgets.php:68
Maintenance & Trust

BinaryM CMS Pack Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedFeb 5, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

BinaryM CMS Pack Developer Profile

Matt McInvale

5 plugins · 1K total installs

81
trust score
Avg Security Score
81/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect BinaryM CMS Pack

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
linkschildpagechildNavigationchildpostpostattachedFilesbinaryIframe
HTML Comments
<!-- attachedFiles -->
Data Attributes
data-parent-post
Shortcode Output
<ul class="links"><div class="childpage"><h3><a href=<p>
FAQ

Frequently Asked Questions about BinaryM CMS Pack