Improve the usability of your Wordpress CMS system. This plug-in creates a dashboard widget with clearly labeled large buttons of the most common task …

300 active installs v2.0 PHP + WP 3.0+ Updated Sep 7, 2010
adminadministrationclientcmspages
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CMS Dashboard Safe to Use in 2026?

Generally Safe

Score 85/100

CMS Dashboard has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The static analysis of "content-management-system-dashboard" v2.0 reveals a plugin with a seemingly low attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which are common entry points for vulnerabilities. Furthermore, the code signals indicate a positive absence of dangerous functions, raw SQL queries, file operations, external HTTP requests, and bundled libraries. The taint analysis also shows no flows with unsanitized paths or any vulnerabilities detected in this area.

However, a significant concern arises from the complete lack of output escaping. With 21 total outputs and 0% properly escaped, this presents a considerable risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the plugin that originates from user input or external sources could potentially be injected with malicious scripts. Additionally, the absence of nonce and capability checks, while not directly indicating a vulnerability in the provided entry points (as there are none), signifies a potential weakness in a broader security context if new entry points were to be added without proper security considerations.

The plugin's vulnerability history is exceptionally clean, with no known CVEs recorded. This, combined with the static analysis findings (excluding the output escaping), might suggest a well-maintained codebase. However, the lack of output escaping is a fundamental security oversight that needs immediate attention. The overall security posture is a mix of strengths in its limited attack surface and absence of common risky code patterns, but critically undermined by the pervasive lack of output escaping.

Key Concerns

  • 0% output escaping for 21 outputs
  • 0 nonce checks
  • 0 capability checks
Vulnerabilities
None known

CMS Dashboard Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

CMS Dashboard Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

CMS Dashboard Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
21
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped21 total outputs
Attack Surface

CMS Dashboard Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_dashboard_setupcms-dashboard.php:71
actionadmin_headcms-dashboard.php:79
actionadmin_menucms-dashboard.php:86
actionadmin_initcms-dashboard.php:92
Maintenance & Trust

CMS Dashboard Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedSep 7, 2010
PHP min version
Downloads23K

Community Trust

Rating80/100
Number of ratings1
Active installs300
Developer Profile

CMS Dashboard Developer Profile

3pointross

4 plugins · 390 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CMS Dashboard

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/content-management-system-dashboard/cms-dashboard.css

HTML / DOM Fingerprints

CSS Classes
dashboard-cms
Data Attributes
id="dashboard-cms"
FAQ

Frequently Asked Questions about CMS Dashboard