byBrick Accordion Security & Risk Analysis

wordpress.org/plugins/bybrick-accordion

A plugin that enables in-post open and close menus/accordions.

60 active installs v1.0 PHP + WP 3.0+ Updated Oct 7, 2011
accordioncollapsibleexpandshortcode
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEMar 31, 2025
Safety Verdict

Is byBrick Accordion Safe to Use in 2026?

Use With Caution

Score 64/100

byBrick Accordion has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Mar 31, 2025Updated 14yr ago
Risk Assessment

The static analysis of the bybrick-accordion plugin v1.0 reveals a seemingly robust security posture from a code perspective. There are no identified dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. Furthermore, the plugin exhibits no file operations, external HTTP requests, or critical code signals like missing nonce or capability checks in its analyzed entry points, which are nonexistent. This suggests that the direct attack surface within the analyzed code is minimal and well-hardened against common code injection and data manipulation vulnerabilities.

However, the presence of one known and currently unpatched CVE for this plugin, specifically a medium severity Cross-Site Scripting (XSS) vulnerability, significantly elevates the risk. The static analysis, while thorough for the code provided, does not appear to have flagged the conditions leading to this historical vulnerability, implying the vulnerability might reside in an area not covered by the static analysis scope or that the analysis tools were not configured to detect this specific type of flaw. The fact that the last vulnerability was in 2025 suggests the plugin may not be actively maintained or that a patch was intended but not implemented, leaving users exposed.

In conclusion, while the current code appears clean and follows secure coding practices, the unpatched XSS vulnerability is a critical concern. The plugin's security is compromised by its vulnerability history, indicating a significant risk despite the positive findings in the static code analysis. Users should be extremely cautious and prioritize updating or replacing this plugin.

Key Concerns

  • Unpatched medium severity CVE
Vulnerabilities
1

byBrick Accordion Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31621medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

byBrick Accordion <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

Mar 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

byBrick Accordion Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

byBrick Accordion Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_postsbybrick-accordion.php:21
Maintenance & Trust

byBrick Accordion Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 7, 2011
PHP min version
Downloads5K

Community Trust

Rating80/100
Number of ratings4
Active installs60
Developer Profile

byBrick Accordion Developer Profile

davidpaulsson

2 plugins · 130 total installs

77
trust score
Avg Security Score
75/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect byBrick Accordion

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bybrick-accordion/style.css

HTML / DOM Fingerprints

CSS Classes
accordion-titleaccordion-content
HTML Comments
<!-- Please define the title for the accordion -->
Data Attributes
id="bb_accordion_
JS Globals
jQuery
Shortcode Output
<div id="_title" class="accordion-title"></div><div style="display:none;" id="
FAQ

Frequently Asked Questions about byBrick Accordion