Cumulonimbus Security & Risk Analysis

wordpress.org/plugins/cumulonimbus

Cumulonimbus allows you to display your site's tags on the surface of a rotating sphere.

20 active installs v0.20 PHP + WP 2.3+ Updated Jun 2, 2013
sidebartagswidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cumulonimbus Safe to Use in 2026?

Generally Safe

Score 85/100

Cumulonimbus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of Cumulonimbus v0.20 reveals a seemingly robust security posture with no identified attack surface, dangerous functions, or file operations. The plugin exclusively uses prepared statements for its SQL queries, which is a strong indicator of good practice in preventing SQL injection vulnerabilities. However, the analysis flags a significant concern regarding output escaping, with only 10% of the 21 identified outputs being properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data might be directly reflected in the output without adequate sanitization.

The lack of any recorded vulnerability history, including CVEs, is a positive sign, suggesting the plugin has not been a target for known exploits or has a history of secure development. Coupled with the absence of external HTTP requests and bundled libraries, this further contributes to a generally low-risk profile. Nonetheless, the low percentage of properly escaped output remains a critical weakness that could be easily exploited by attackers. The absence of nonce checks and capability checks on the identified entry points (even though zero) could become a risk if the attack surface expands in future versions without proper security considerations.

In conclusion, Cumulonimbus v0.20 exhibits strengths in its handling of SQL queries and lack of external dependencies or known vulnerabilities. However, the severe deficiency in output escaping presents a substantial risk of XSS attacks. Future development should prioritize addressing this output escaping issue to solidify the plugin's security. The current version, despite its lack of known vulnerabilities, carries a demonstrable risk due to potential XSS flaws.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Cumulonimbus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cumulonimbus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

10% escaped21 total outputs
Attack Surface

Cumulonimbus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initcumulonimbus.php:192
Maintenance & Trust

Cumulonimbus Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJun 2, 2013
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Cumulonimbus Developer Profile

beeender

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cumulonimbus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/cumulonimbus/tagboard.js/wp-content/plugins/cumulonimbus/sphereboard.js
Script Paths
/wp-content/plugins/cumulonimbus/tagboard.js/wp-content/plugins/cumulonimbus/sphereboard.js

HTML / DOM Fingerprints

Data Attributes
id='cumulonimbusCanvas'
JS Globals
addTagOptionscreateTagBoardstart
Shortcode Output
<div id='tagcloud' style='display:none'><canvas id='cumulonimbusCanvas'
FAQ

Frequently Asked Questions about Cumulonimbus