Check Wallet Security & Risk Analysis

wordpress.org/plugins/check-wallet

Check the balance of your Bitcoin wallet

10 active installs v1.5 PHP + WP + Updated Jan 17, 2017
bitcoincoinshortcodesidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Check Wallet Safe to Use in 2026?

Generally Safe

Score 85/100

Check Wallet has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "check-wallet" plugin v1.5 exhibits a mixed security posture. On the positive side, it demonstrates excellent practices regarding SQL queries, exclusively utilizing prepared statements, and has no recorded vulnerabilities or CVEs. The static analysis also shows a very small attack surface, with only one entry point identified (a shortcode) and no AJAX handlers or REST API routes contributing to it. Furthermore, there are no file operations or external HTTP requests, which generally reduces potential risks.

However, significant concerns arise from the output escaping and taint analysis. A striking 0% of the 8 identified outputs are properly escaped, meaning that any data rendered by the plugin could be vulnerable to cross-site scripting (XSS) attacks. This is further compounded by a taint flow analysis that reveals one instance of an unsanitized path. While the severity is not classified as critical or high, the presence of unsanitized paths and unescaped output presents a clear risk of code injection or data leakage.

In conclusion, while the plugin benefits from a minimal attack surface and a clean vulnerability history, the unescaped output and unsanitized path represent critical weaknesses. The lack of explicit capability checks or nonce checks on its single entry point, combined with the unescaped output, suggests a potential for privilege escalation or XSS if user-supplied data is involved in the shortcode's functionality. These areas require immediate attention to improve the plugin's overall security.

Key Concerns

  • Unescaped output detected (8 outputs, 0% escaped)
  • Flow with unsanitized paths detected
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Check Wallet Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Check Wallet Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<go> (go.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Check Wallet Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[check-wallet] check-wallet.php:82
WordPress Hooks 1
actionwidgets_initcheck-wallet.php:83
Maintenance & Trust

Check Wallet Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 17, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Check Wallet Developer Profile

Tomek

10 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Check Wallet

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/check-wallet/go.php

HTML / DOM Fingerprints

CSS Classes
check-wallet
Shortcode Output
<div class="check-wallet"><center><form action="method="get" target="_blank"><input type="text" name="address" placeholder="">
FAQ

Frequently Asked Questions about Check Wallet