Simple Website Banner Security & Risk Analysis

wordpress.org/plugins/corona-virus-covid-19-banner

This is a very simple plugin with a sole purpose of allowing you to inform your visitors of an upcoming event, updated store hours, or other important …

700 active installs v1.8.0.4 PHP 7.4+ WP 5.1+ Updated May 9, 2024
bannercoronaviruscovidcovid-19simple-web
90
A · Safe
CVEs total2
Unpatched0
Last CVEMay 6, 2024
Download
Safety Verdict

Is Simple Website Banner Safe to Use in 2026?

Generally Safe

Score 90/100

Simple Website Banner has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: May 6, 2024Updated 1yr ago
Risk Assessment

The static analysis of the "corona-virus-covid-19-banner" plugin version 1.8.0.4 reveals a seemingly clean code base with no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code shows a positive sign by using prepared statements for all SQL queries and avoiding dangerous functions, file operations, and external HTTP requests. However, a significant concern arises from the low percentage (20%) of properly escaped output, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Taint analysis also shows no reported issues, which, when combined with the output escaping findings, might suggest an incomplete taint analysis or an oversight in identifying potential XSS vectors.

The vulnerability history paints a more concerning picture. With two known CVEs, including a high and a medium severity vulnerability, and a recent history of XSS and CSRF issues, the plugin has a track record of security weaknesses. The fact that there are currently no unpatched vulnerabilities is a positive sign, but the pattern of past issues, particularly XSS, combined with the static analysis finding of poor output escaping, strongly suggests that XSS remains a significant potential risk. While the absence of an exploitable attack surface and proper SQL handling are good, the persistent output escaping problem and past vulnerability trends indicate a need for caution.

Key Concerns

  • Low percentage of properly escaped output
  • One unpatched medium severity vulnerability
  • One unpatched high severity vulnerability
  • History of XSS and CSRF vulnerabilities
Vulnerabilities
2

Simple Website Banner Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2024-34429medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Corona Virus (COVID-19) Banner & Live Data <= 1.8.0.3 - Authenticated (Administrator+) Stored Cross-Site Scripting

May 6, 2024 Patched in 1.8.0.4 (45d)
CVE-2022-43469high · 8.8Cross-Site Request Forgery (CSRF)

Corona Virus (COVID-19) Banner & Live Data <= 1.7.0.6 - Cross-Site Request Forgery

Oct 24, 2022 Patched in 1.8.0.0 (484d)
Code Analysis
Analyzed Mar 16, 2026

Simple Website Banner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
67
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped84 total outputs
Attack Surface

Simple Website Banner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitincludes\orchestrated-corona-virus-banner-settings.php:18
actionadmin_initincludes\orchestrated-corona-virus-banner-settings.php:21
actionadmin_menuincludes\orchestrated-corona-virus-banner-settings.php:24
actionwp_enqueue_scriptsincludes\orchestrated-corona-virus-banner.php:38
actionwp_enqueue_scriptsincludes\orchestrated-corona-virus-banner.php:39
actionadmin_enqueue_scriptsincludes\orchestrated-corona-virus-banner.php:42
actionadmin_enqueue_scriptsincludes\orchestrated-corona-virus-banner.php:43
actioninitincludes\orchestrated-corona-virus-banner.php:49
actionwp_footerincludes\orchestrated-corona-virus-banner.php:50
Maintenance & Trust

Simple Website Banner Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedMay 9, 2024
PHP min version7.4
Downloads54K

Community Trust

Rating100/100
Number of ratings8
Active installs700
Developer Profile

Simple Website Banner Developer Profile

Nick Tomkin

3 plugins · 700 total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
265 days
View full developer profile
Detection Fingerprints

How We Detect Simple Website Banner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/corona-virus-covid-19-banner/assets/css/front.css/wp-content/plugins/corona-virus-covid-19-banner/assets/js/front.js
Script Paths
/wp-content/plugins/corona-virus-covid-19-banner/assets/js/front.js
Version Parameters
corona-virus-covid-19-banner/assets/css/front.css?ver=corona-virus-covid-19-banner/assets/js/front.js?ver=

HTML / DOM Fingerprints

CSS Classes
ocvb-enabledocvb-disabledocvb-display-type-bannerocvb-display-type-overlayocvb-display-type-leaderboardocvb-display-type-bannerocvb-display-type-overlayocvb-display-type-leaderboard+7 more
Data Attributes
data-message-alignmentdata-allow-close
JS Globals
Orchestrated_Corona_Virus_Banner
FAQ

Frequently Asked Questions about Simple Website Banner