Content Fetcher Security & Risk Analysis

wordpress.org/plugins/content-fetcher

Fetch content from any website with simple shortcode

200 active installs v1.1 PHP + WP + Updated Oct 11, 2025
content-fectchercontent-fetchingcontent-scraperdata-scrapescraper
78
B · Generally Safe
CVEs total1
Unpatched1
Last CVEDec 31, 2025
Safety Verdict

Is Content Fetcher Safe to Use in 2026?

Mostly Safe

Score 78/100

Content Fetcher is generally safe to use. 1 past CVE were resolved. Keep it updated.

1 known CVE 1 unpatched Last CVE: Dec 31, 2025Updated 5mo ago
Risk Assessment

The 'content-fetcher' plugin version 1.1 presents a mixed security posture. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for its SQL queries and has no external HTTP requests or bundled libraries, which are common sources of vulnerabilities. The attack surface is also relatively small with only one shortcode entry point, and importantly, all identified entry points appear to lack authentication checks. However, several significant concerns exist. The most pressing is the presence of one unpatched medium severity vulnerability, historically related to Cross-Site Scripting (XSS), which represents a direct and present danger to users if exploited. Furthermore, the static analysis reveals a critical flaw in output escaping, with 100% of outputs being improperly escaped, making it highly susceptible to XSS attacks across all its outputs. The lack of nonce and capability checks on its single shortcode entry point, despite the absence of AJAX or REST API routes, means any user can trigger its functionality and potentially exploit the unescaped output. The taint analysis showing zero flows is a positive sign, but it doesn't mitigate the clear output escaping and historical XSS vulnerabilities. In conclusion, while the plugin avoids some common pitfalls, the unpatched XSS vulnerability combined with pervasive output escaping issues and a lack of proper authorization on its shortcode presents a significant risk.

Key Concerns

  • Unpatched medium severity CVE (XSS)
  • 100% of outputs unescaped
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
1

Content Fetcher Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49358medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Content Fetcher <= 1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting

Dec 31, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Content Fetcher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

Content Fetcher Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[get_content_from] index.php:60
Maintenance & Trust

Content Fetcher Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 11, 2025
PHP min version
Downloads8K

Community Trust

Rating64/100
Number of ratings6
Active installs200
Developer Profile

Content Fetcher Developer Profile

Ruhul Amin

2 plugins · 200 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Content Fetcher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/content-fetcher/dom.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Content Fetcher