Church Options Security & Risk Analysis

wordpress.org/plugins/church-options

An all-in-one solution for churches to add the custom post types and custom fields they need for an effective website. Compatible theme required.

10 active installs v1.0.3 PHP 5.2.4+ WP 4.6+ Updated Unknown
announcementschurchchurch-optionseventsministries
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Church Options Safe to Use in 2026?

Generally Safe

Score 100/100

Church Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "church-options" plugin v1.0.3 exhibits a generally strong security posture based on the provided static analysis. The absence of any recorded CVEs and the fact that all SQL queries utilize prepared statements are significant strengths. Furthermore, the plugin has no recorded vulnerabilities, which suggests a history of secure development practices or a lack of exploitation attempts, either of which is positive. The limited attack surface is also commendable, with no AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal footprint for potential attackers.

However, a notable concern is the low percentage of properly escaped output (40%). This means a significant portion of the plugin's output is not being sanitized, potentially exposing it to cross-site scripting (XSS) vulnerabilities. While taint analysis did not reveal any critical or high-severity flows, the lack of input validation on output could still lead to issues if user-supplied data is directly rendered. The presence of bundled libraries, jQuery v3.3.1 and TinyMCE, while not inherently insecure, could become a risk if they contain known, unpatched vulnerabilities in those specific versions, though this is not indicated in the provided history.

In conclusion, the "church-options" plugin demonstrates good practices in areas like SQL sanitization and attack surface minimization. The primary weakness lies in the insufficient output escaping, which requires attention to prevent potential XSS vulnerabilities. The clean vulnerability history is encouraging, but the output escaping issue should be addressed proactively to maintain a robust security profile.

Key Concerns

  • Insufficient output escaping
  • Bundled outdated jQuery library
  • Bundled outdated TinyMCE library
Vulnerabilities
None known

Church Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Church Options Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
12
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
2

Bundled Libraries

jQuery3.3.1TinyMCE

SQL Query Safety

100% prepared4 total queries

Output Escaping

40% escaped20 total outputs
Attack Surface

Church Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
actioninitchurch-options.php:62
actionadmin_initchurch-options.php:69
actionadmin_menuchurch-options.php:73
actionwp_enqueue_scriptschurch-options.php:77
actionadmin_enqueue_scriptschurch-options.php:78
filteracf/settings/pathchurch-options.php:82
filteracf/settings/dirchurch-options.php:83
filteracf/settings/show_adminchurch-options.php:84
actionadmin_noticeschurch-options.php:93
actioninitcpt\church-announcements.php:36
actionedit_form_topcpt\church-announcements.php:45
actioninitcpt\church-events.php:36
actioninitcpt\church-ministries.php:36
actioninitcpt\church-people.php:36
actionedit_form_topcpt\church-people.php:45
actioninitcpt\church-sermons.php:37
actioninitcpt\church-sermons.php:63
actioninitcpt\church-verses.php:36
actionedit_form_topcpt\church-verses.php:45
actionwidgets_initwidgets\church-verses-widget.php:95
Maintenance & Trust

Church Options Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedUnknown
PHP min version5.2.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Church Options Developer Profile

Tim Lawson

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Church Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/church-options/css/private/style.css/wp-content/plugins/church-options/css/public/custom.css/wp-content/plugins/church-options/js/private/custom.js/wp-content/plugins/church-options/js/public/scripts.js
Script Paths
/wp-content/plugins/church-options/js/public/scripts.js/wp-content/plugins/church-options/js/private/custom.js
Version Parameters
church-options/css/public/custom.css?ver=church-options/js/public/scripts.js?ver=church-options/css/private/style.css?ver=church-options/js/private/custom.js?ver=

HTML / DOM Fingerprints

Data Attributes
dashicons-admin-settings
Shortcode Output
[church-announcements]
FAQ

Frequently Asked Questions about Church Options