Chunks Security & Risk Analysis

wordpress.org/plugins/chunks

Chunks is about managing tiny bits of content on your WordPress site.

10 active installs v1.1 PHP + WP 2.8+ Updated Jun 17, 2011
chunksthemeutility
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Chunks Safe to Use in 2026?

Generally Safe

Score 85/100

Chunks has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "chunks" v1.1 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL query handling, utilizing prepared statements exclusively, and it has no recorded vulnerability history, suggesting a generally stable codebase. The attack surface is minimal, with only one shortcode and no AJAX handlers or REST API routes, and importantly, no identified entry points lack authentication checks.

However, several significant concerns emerge from the static analysis. The presence of the `create_function` function is a critical red flag, as it can be a source of severe security vulnerabilities if not handled with extreme care. Furthermore, the output escaping is severely lacking, with only 9% of outputs properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis also reveals two flows with unsanitized paths, which, while not classified as critical or high severity in this report, warrant further investigation as they indicate potential pathways for malicious input to reach sensitive operations. The lack of nonce and capability checks on the identified entry points is also a notable weakness, potentially allowing unauthorized actions.

In conclusion, while the plugin avoids common pitfalls like raw SQL and has no known CVEs, the combination of poor output escaping, the use of `create_function`, and unsanitized taint flows presents a considerable risk. The absence of specific authentication checks on the shortcode is particularly concerning. Mitigation efforts should focus on comprehensive output escaping and a thorough review of the `create_function` usage and taint flow destinations.

Key Concerns

  • Unsanitized paths in taint flows
  • Low percentage of properly escaped output
  • Dangerous function: create_function
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Chunks Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Chunks Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
10
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'plugins_loaded', create_function( '', 'global $chunks; $chunks = new Chunks();' ) );chunks.php:266

Output Escaping

9% escaped11 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
theme_page (chunks.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Chunks Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[chunk] chunks.php:37
WordPress Hooks 2
actionadmin_menuchunks.php:34
actionplugins_loadedchunks.php:266
Maintenance & Trust

Chunks Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJun 17, 2011
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Chunks Developer Profile

Konstantin Kovshenin

15 plugins · 19K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Chunks

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p>Below is a list of chunks that <strong>
FAQ

Frequently Asked Questions about Chunks