Codious External Links Opener Security & Risk Analysis

wordpress.org/plugins/codious-external-links-opener

Automatically adds target="_blank" and rel="noopener noreferrer" to external links in post content to improve user experience and security.

0 active installs v1.1 PHP 7.2+ WP 5.0+ Updated Jan 2, 2026
external-linksnew-tabrel-noopenertarget-blank
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Codious External Links Opener Safe to Use in 2026?

Generally Safe

Score 100/100

Codious External Links Opener has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The 'codious-external-links-opener' plugin version 1.1 exhibits a generally strong security posture based on the provided static analysis. There are no identified dangerous functions, all SQL queries use prepared statements, and all output appears to be properly escaped. Furthermore, the plugin has no recorded vulnerability history, indicating a lack of past security issues and a potential for stable development practices. The absence of file operations, external HTTP requests, and reliance on bundled libraries further minimizes common attack vectors.

Despite these positive indicators, the complete lack of any identified entry points (AJAX, REST API, shortcodes, cron events) and consequently, no unprotected entry points, raises a flag. While this implies a minimal attack surface, it could also suggest that the plugin's functionality is not exposed to the WordPress environment in a way that was detectable by the static analysis tools, or that its functionality is exceptionally limited. Without any detectable entry points, it's difficult to fully assess the security of its potential interactions, even if the core code itself appears robust. A lack of nonces and capability checks is also noted, which, while not directly exploitable in this case due to the lack of entry points, are generally good security practices to implement for future expansions or if functionality is added.

In conclusion, the plugin's current version demonstrates excellent secure coding practices for the analyzed code. The absence of vulnerabilities and secure handling of data are significant strengths. However, the extremely limited attack surface, while seemingly secure, leaves room for questions about its overall effectiveness and potential for future insecure additions if not carefully managed. The lack of explicit authentication and authorization checks on potential (though currently non-existent) entry points is a minor concern in terms of best practices.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Codious External Links Opener Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Codious External Links Opener Release Timeline

v1.1Current
Code Analysis
Analyzed Apr 16, 2026

Codious External Links Opener Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Codious External Links Opener Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterthe_contentcodious-external-links-opener.php:45
filterwidget_textcodious-external-links-opener.php:46
filterwidget_text_contentcodious-external-links-opener.php:47
filterwp_nav_menu_itemscodious-external-links-opener.php:48
actionwp_enqueue_scriptscodious-external-links-opener.php:62
Maintenance & Trust

Codious External Links Opener Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 2, 2026
PHP min version7.2
Downloads160

Community Trust

Rating100/100
Number of ratings2
Active installs0
Developer Profile

Codious External Links Opener Developer Profile

Codious Technologies

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Codious External Links Opener

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/codious-external-links-opener/js/external-links.js
Script Paths
/wp-content/plugins/codious-external-links-opener/js/external-links.js
Version Parameters
codious-external-links-opener/js/external-links.js?ver=1.1

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Codious External Links Opener