Classic Smilies Security & Risk Analysis

wordpress.org/plugins/classic-smilies

Replace the smilies with the original versions from previous versions of WordPress.

200 active installs v1.3 PHP + WP 4.2+ Updated Jan 6, 2016
classicsmilies
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Classic Smilies Safe to Use in 2026?

Generally Safe

Score 85/100

Classic Smilies has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the "classic-smilies" plugin version 1.3 exhibits a strong security posture. The code analysis reveals no identified dangerous functions, SQL queries that are not properly prepared, or output that is not escaped. Furthermore, there are no file operations or external HTTP requests, and importantly, no detectable taint flows, indicating a robust approach to handling user input and preventing common web vulnerabilities.

The plugin's attack surface is also minimal, with no AJAX handlers, REST API routes, shortcodes, or cron events. Crucially, the absence of unprotected entry points suggests that any interactions with the plugin would likely require proper authentication and authorization. The vulnerability history is equally clean, with no recorded CVEs of any severity, further reinforcing the plugin's current security standing. This indicates a consistent track record of security consciousness by the developers.

In conclusion, the "classic-smilies" plugin version 1.3 appears to be very secure based on the provided data. The developers have implemented excellent security practices, and there are no immediate red flags. The lack of any vulnerabilities, combined with the clean code analysis, presents a low-risk profile. However, as with any software, continuous monitoring and timely updates for future versions are always recommended.

Vulnerabilities
None known

Classic Smilies Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Classic Smilies Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Classic Smilies Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitclassic_smilies.php:19
filtersmilies_srcclassic_smilies.php:73
filtertiny_mce_pluginsclassic_smilies.php:83
filterthe_contentclassic_smilies.php:84
filterthe_excerptclassic_smilies.php:85
filtercomment_textclassic_smilies.php:86
Maintenance & Trust

Classic Smilies Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 6, 2016
PHP min version
Downloads11K

Community Trust

Rating98/100
Number of ratings13
Active installs200
Developer Profile

Classic Smilies Developer Profile

Samuel Wood (Otto)

9 plugins · 167K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
3759 days
View full developer profile
Detection Fingerprints

How We Detect Classic Smilies

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wp-smiley
Data Attributes
class="wp-smiley" style="height: 1em; max-height: 1em;"
FAQ

Frequently Asked Questions about Classic Smilies