
BroadedNet Security & Risk Analysis
wordpress.org/plugins/broadednetConnect to Broaded.net, a network of blogs for promotion and traffic
Is BroadedNet Safe to Use in 2026?
Generally Safe
Score 85/100BroadedNet has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "broadednet" plugin v1.4 presents a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices regarding SQL queries, utilizing prepared statements exclusively, and it has no recorded vulnerability history, indicating a generally stable and well-maintained codebase. The attack surface is also zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, which significantly reduces the potential for external exploitation.
However, there are significant concerns. The presence of the `create_function` dangerous function is a major red flag, as it is deprecated and can lead to severe security vulnerabilities if used improperly. Furthermore, the exceptionally low percentage (3%) of properly escaped output suggests a high likelihood of cross-site scripting (XSS) vulnerabilities. The taint analysis revealing two flows with unsanitized paths, even if not classified as critical or high severity in this report, warrants attention as it points to potential data leakage or manipulation risks. The complete absence of nonce checks and capability checks on any potential entry points, combined with a lack of output escaping, significantly elevates the risk of various attacks, particularly XSS and unauthorized actions if any entry points were to be discovered or introduced in future versions.
In conclusion, while the plugin benefits from a clean vulnerability history and secure SQL handling, the identified dangerous function, widespread output unescaping, and lack of authorization checks on potential (though currently zero) entry points create notable security weaknesses. These issues could be exploited, especially the XSS risks due to insufficient output escaping.
Key Concerns
- Dangerous function create_function used
- Very low percentage of output properly escaped
- Taint flow with unsanitized paths
- No nonce checks
- No capability checks
BroadedNet Security Vulnerabilities
BroadedNet Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
BroadedNet Attack Surface
WordPress Hooks 1
Maintenance & Trust
BroadedNet Maintenance & Trust
Maintenance Signals
Community Trust
BroadedNet Alternatives
Fake Traffic Blaster
fake-traffic-blaster
Protect WordPress blogs from fake traffic by redirecting suspicious visitors away from your blog.
SiteOrigin Widgets Bundle
so-widgets-bundle
Essential elements for modern websites. Add buttons, sliders, heroes, maps, images, carousels, features, icons, more. Create dynamic pages easily.
Metricool
metricool
Metricool is the first tool designed to measure #Blog impact and #SocialMedia activity.
All In One Favicon
all-in-one-favicon
Easily add a Favicon to your site and the WordPress admin pages. Complete with upload functionality. Supports all three Favicon types (ico,png,gif).
Blogger Importer
blogger-importer
Imports posts, images, comments, and categories (blogger tags) from a Blogger blog then migrates authors to WordPress users.
BroadedNet Developer Profile
2 plugins · 20 total installs
How We Detect BroadedNet
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/broadednet/broadedNET.phpHTML / DOM Fingerprints
BroadedNetid="broaded.net/catwidget.php"name="broaded.net/catwidget.php"value="broaded.net/catwidget.php"