Core Settings Security & Risk Analysis

wordpress.org/plugins/core-settings

Fights against unnecessary WP core settings, removes needless metas and links from header html section.

10 active installs v1.01 PHP + WP 2.5+ Updated May 10, 2020
needless-linksremove-emojiremove-metasremove-rest-apisettings
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Core Settings Safe to Use in 2026?

Generally Safe

Score 85/100

Core Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "core-settings" v1.01 plugin exhibits a mixed security posture. On one hand, it demonstrates excellent practices by having no known vulnerabilities (CVEs) and a clean vulnerability history, suggesting diligent maintenance and a lack of past exploitable issues. Furthermore, the absence of AJAX handlers, REST API routes, shortcodes, cron events, and file operations significantly limits the plugin's attack surface. The plugin also utilizes prepared statements for all SQL queries, which is a crucial security measure against SQL injection.

However, a significant concern arises from the static analysis revealing that 100% of the 16 output operations are not properly escaped. This presents a high risk of cross-site scripting (XSS) vulnerabilities, where malicious code could be injected into the application through user-supplied data that is later displayed on the frontend. Additionally, the taint analysis indicates two flows with unsanitized paths, which, while not classified as critical or high severity in this instance, still represent potential pathways for unexpected or malicious data handling. The lack of nonce and capability checks, while not directly exploitable given the zero entry points, means that if any entry points were introduced in future versions, they would lack fundamental security protections.

Key Concerns

  • Unescaped output across all outputs
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Core Settings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Core Settings Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Core Settings Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped16 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
_options_page (core-settings.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Core Settings Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menucore-settings.php:20
actioninitcore-settings.php:21
filterxmlrpc_enabledcore-settings.php:201
filtertiny_mce_pluginscore-settings.php:212
filterrest_enabledcore-settings.php:217
Maintenance & Trust

Core Settings Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 10, 2020
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Core Settings Developer Profile

Ashraful Sarkar Naiem

46 plugins · 20K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
111 days
View full developer profile
Detection Fingerprints

How We Detect Core Settings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrapoptions
Data Attributes
name="action"value="save_cache_settings"
FAQ

Frequently Asked Questions about Core Settings