Conditional Content Security & Risk Analysis

wordpress.org/plugins/conditional-content

Looking for a tool for adding sticky content on your WordPress site pages/posts?

10 active installs v1.0.1 PHP 5.5+ WP 4.0+ Updated Nov 30, 2020
advertisementadvertisement-blocksconditional-contentcontentmessages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Conditional Content Safe to Use in 2026?

Generally Safe

Score 85/100

Conditional Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "conditional-content" plugin v1.0.1 exhibits a generally good security posture in terms of its exposed attack surface and SQL query handling. It correctly utilizes prepared statements for all SQL queries and reports no known vulnerabilities or CVEs, indicating a history of responsible development or minimal exposure. However, the static analysis reveals significant areas of concern. The presence of the `unserialize` function is a critical red flag, as it can lead to remote code execution vulnerabilities if user-supplied data is unserialized without proper sanitization. While the taint analysis did not report critical or high severity unsanitized flows, the very existence of flows with unsanitized paths, combined with `unserialize`, creates a substantial risk. Furthermore, the low percentage of properly escaped output (14%) suggests a high likelihood of cross-site scripting (XSS) vulnerabilities, as user-controlled data is likely being rendered directly into the page without adequate sanitization. The lack of nonce checks and the minimal capability checks also contribute to a weaker security posture for potential entry points, although the current entry point count is zero.

Key Concerns

  • Unsanitized unserialize() function usage
  • Low percentage of properly escaped output
  • Flows with unsanitized paths found
  • Zero nonce checks
  • One capability check for all entry points
Vulnerabilities
None known

Conditional Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Conditional Content Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
1 escaped
Nonce Checks
0
Capability Checks
1
File Operations
6
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

unserialize$this->settings = unserialize(get_option(self::OPTION, serialize($this->getDefaultSettings())));classes\core\Settings.php:39

Output Escaping

14% escaped7 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
submitForm (conditional-content.php:226)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Conditional Content Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionplugins_loadedconditional-content.php:39
actionadmin_menuconditional-content.php:125
actionwp_headconditional-content.php:128
actionwidgets_initconditional-content.php:130
filterconditional_content_widget_textconditional-content.php:131
Maintenance & Trust

Conditional Content Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedNov 30, 2020
PHP min version5.5
Downloads7K

Community Trust

Rating100/100
Number of ratings5
Active installs10
Developer Profile

Conditional Content Developer Profile

extremeidea

5 plugins · 100 total installs

81
trust score
Avg Security Score
82/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Conditional Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Conditional Content