Ciusan Restrict Widget Security & Risk Analysis

wordpress.org/plugins/ciusan-restrict-widget

Ciusan Restrict Widget can show message for user loggedin or for user not loggedin only in widget area.

10 active installs v1.0 PHP + WP 3.2+ Updated Feb 21, 2015
ciusanguestrestrictuservisitor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ciusan Restrict Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Ciusan Restrict Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "ciusan-restrict-widget" plugin, version 1.0, exhibits a mixed security posture. On the positive side, it has a very small attack surface with no discovered AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no known vulnerabilities or CVEs associated with this plugin, which is a strong indicator of good security practices in its development history. The absence of file operations and external HTTP requests also contributes to a more secure profile.

However, several concerning code signals raise significant risks. The presence of the `create_function` is a critical vulnerability as it is deprecated and can lead to code injection if user-supplied input is passed to it without proper sanitization. The plugin also performs SQL queries without using prepared statements, making it susceptible to SQL injection. Most alarmingly, none of the 26 output operations are properly escaped, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce and capability checks on any potential entry points, though the attack surface is currently zero, means any future expansion could introduce vulnerabilities without the necessary security measures.

In conclusion, while the plugin's current limited attack surface and clean vulnerability history are strengths, the identified code signals represent serious security weaknesses. The use of `create_function`, raw SQL queries, and unescaped output are substantial risks that require immediate attention. The absence of authorization checks for any potential future entry points is also a critical oversight. This plugin, despite its apparent simplicity, carries a significant risk profile due to these fundamental security flaws.

Key Concerns

  • Dangerous function: create_function used
  • SQL queries without prepared statements
  • Output escaping not used
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Ciusan Restrict Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Ciusan Restrict Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
0 prepared
Unescaped Output
26
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("ciusan_restrict_widget");'))ciusan-restrict-widget.php:153

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped26 total outputs
Attack Surface

Ciusan Restrict Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initciusan-restrict-widget.php:153
Maintenance & Trust

Ciusan Restrict Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedFeb 21, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Ciusan Restrict Widget Developer Profile

Dannie Herdyawan

6 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ciusan Restrict Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ciusan-restrict-widget/ciusan-restrict-widget.php

HTML / DOM Fingerprints

CSS Classes
ciusan_restrict_widget
Data Attributes
id="ciusan_restrict_widget"
Shortcode Output
%%display_name%%
FAQ

Frequently Asked Questions about Ciusan Restrict Widget