
Currently Reading Security & Risk Analysis
wordpress.org/plugins/currently-readingDisplays a cover image of a book with a link to Google Books based on a supplied ISBN-10 or ISBN-13.
Is Currently Reading Safe to Use in 2026?
Generally Safe
Score 92/100Currently Reading has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of the "currently-reading" plugin v4.1.6 reveals a generally positive security posture with no immediate critical vulnerabilities identified. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals show no dangerous functions, no raw SQL queries (all prepared statements), and no external HTTP requests. This indicates a developer who is mindful of common security pitfalls. However, a notable concern is the very low percentage of properly escaped output (4%). With 49 total outputs, only 4% are properly escaped, meaning a significant portion of user-generated or dynamic content could potentially be rendered without proper sanitization, leading to cross-site scripting (XSS) vulnerabilities. The plugin also lacks explicit nonce and capability checks, which, while not directly exploitable given the limited attack surface in this version, represent a missed opportunity for robust authentication and authorization where they might be needed in future development.
The vulnerability history is completely clean, with no known CVEs ever recorded for this plugin. This is a strong indicator that the plugin has historically been developed with security in mind or has not attracted malicious attention due to its limited functionality or scope. The lack of any recorded vulnerabilities, even low severity ones, suggests a stable and well-maintained codebase over time. Overall, while the plugin exhibits good practices by avoiding common dangerous functions and securing its database interactions, the significant issue with output escaping requires attention to prevent potential XSS risks. The clean history is a positive but should not breed complacency, especially given the identified output sanitization weakness.
Key Concerns
- Low percentage of properly escaped output
- Lack of nonce checks
- Lack of capability checks
Currently Reading Security Vulnerabilities
Currently Reading Release Timeline
Currently Reading Code Analysis
Output Escaping
Currently Reading Attack Surface
WordPress Hooks 1
Maintenance & Trust
Currently Reading Maintenance & Trust
Maintenance Signals
Community Trust
Currently Reading Alternatives
Badges
badges
Display a set of badges based on files in a directory off the root of the blog.
eBook WooSell
ebook-woohook
EBooks distribution plugin for woocommerce. Enable you to sell epub3 ebooks directly to EpubSystems cloud and E-reading Apps.
BNC BiblioShare
bnc-biblioshare
Displays a book's cover image, title, author, and other book data from BiblioShare
Bestseller Lists from the New York Times
bestseller-lists-from-new-york-times
Integrate bestseller lists from the New York Times into your own site with a user-friendly interface.
DeadTrees
dead-trees
Share the books you've read with your readers, family, & friends. Never again receive a book you've already read as a gift!
Currently Reading Developer Profile
3 plugins · 150 total installs
How We Detect Currently Reading
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/currently-reading/currently-reading.css/wp-content/plugins/currently-reading/currently-reading.js/wp-content/plugins/currently-reading/currently-reading.jscurrently-reading.css?ver=currently-reading.js?ver=HTML / DOM Fingerprints
currentlyreadingreading_widgetUsing Google's Book APICache file is Cache file read...Google Books API call successful... Write cache file.+5 moreid='currenlyreading-ISBNid='currenlyreading-ISBN-img'-moz-box-shadow:-webkit-box-shadow:-khtml-box-shadow:box-shadow: