Blogroll Dropdown Security & Risk Analysis

wordpress.org/plugins/blogroll-dropdown

Display links (blogroll) as dropdown select menu

40 active installs v1.0 PHP + WP 3.2+ Updated Sep 11, 2012
blogroll-dropdownblogroll-select-menujump-menulinks-dropdownlinks-select
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Blogroll Dropdown Safe to Use in 2026?

Generally Safe

Score 85/100

Blogroll Dropdown has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The blogroll-dropdown v1.0 plugin exhibits a mixed security posture. On the positive side, it has no known CVEs and demonstrates strong practices in its SQL query handling, exclusively using prepared statements. There are no file operations or external HTTP requests, and the attack surface from AJAX, REST API, shortcodes, and cron events is reported as zero, which is a significant strength.

However, there are notable concerns. The presence of the `create_function` usage is a clear red flag, as this function is deprecated and can be a vector for code injection if not handled with extreme care, although no specific taint flows were identified. Furthermore, a significant portion of output is not properly escaped (only 31% are escaped), which presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. The complete absence of nonce checks and capability checks on any potential entry points, combined with the unescaped output, significantly increases the risk of unauthorized actions and data compromise.

The lack of any recorded vulnerability history is a positive indicator, suggesting a history of responsible development. Nevertheless, the identified code signals, particularly the unescaped output and the use of a deprecated dangerous function, necessitate caution. While the plugin currently appears to have a low attack surface and no direct exploitable vulnerabilities flagged in taint analysis, the unescaped output is a severe weakness that could be easily exploited.

Key Concerns

  • High percentage of unescaped output
  • Usage of deprecated dangerous function (create_function)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Blogroll Dropdown Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Blogroll Dropdown Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
35
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("Blogroll_Dropdown");') );blogroll-dropdown.php:141

Output Escaping

31% escaped51 total outputs
Attack Surface

Blogroll Dropdown Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initblogroll-dropdown.php:141
Maintenance & Trust

Blogroll Dropdown Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedSep 11, 2012
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Alternatives

Blogroll Dropdown Alternatives

No alternatives data available yet.

Developer Profile

Blogroll Dropdown Developer Profile

drmen8x

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Blogroll Dropdown

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
blogroll_class
Shortcode Output
<select class="
FAQ

Frequently Asked Questions about Blogroll Dropdown