Currently Reading Security & Risk Analysis

wordpress.org/plugins/currently-reading

Displays a cover image of a book with a link to Google Books based on a supplied ISBN-10 or ISBN-13.

60 active installs v4.1.6 PHP + WP 6.0+ Updated May 14, 2024
adminadministrationbooksreadreading
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Currently Reading Safe to Use in 2026?

Generally Safe

Score 92/100

Currently Reading has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the "currently-reading" plugin v4.1.6 reveals a generally positive security posture with no immediate critical vulnerabilities identified. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals show no dangerous functions, no raw SQL queries (all prepared statements), and no external HTTP requests. This indicates a developer who is mindful of common security pitfalls. However, a notable concern is the very low percentage of properly escaped output (4%). With 49 total outputs, only 4% are properly escaped, meaning a significant portion of user-generated or dynamic content could potentially be rendered without proper sanitization, leading to cross-site scripting (XSS) vulnerabilities. The plugin also lacks explicit nonce and capability checks, which, while not directly exploitable given the limited attack surface in this version, represent a missed opportunity for robust authentication and authorization where they might be needed in future development.

The vulnerability history is completely clean, with no known CVEs ever recorded for this plugin. This is a strong indicator that the plugin has historically been developed with security in mind or has not attracted malicious attention due to its limited functionality or scope. The lack of any recorded vulnerabilities, even low severity ones, suggests a stable and well-maintained codebase over time. Overall, while the plugin exhibits good practices by avoiding common dangerous functions and securing its database interactions, the significant issue with output escaping requires attention to prevent potential XSS risks. The clean history is a positive but should not breed complacency, especially given the identified output sanitization weakness.

Key Concerns

  • Low percentage of properly escaped output
  • Lack of nonce checks
  • Lack of capability checks
Vulnerabilities
None known

Currently Reading Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Currently Reading Release Timeline

No version history available.
Code Analysis
Analyzed Mar 16, 2026

Currently Reading Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
47
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

4% escaped49 total outputs
Attack Surface

Currently Reading Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initCurrentlyReading.php:262
Maintenance & Trust

Currently Reading Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 14, 2024
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

Currently Reading Developer Profile

eroux

3 plugins · 150 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Currently Reading

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/currently-reading/currently-reading.css/wp-content/plugins/currently-reading/currently-reading.js
Script Paths
/wp-content/plugins/currently-reading/currently-reading.js
Version Parameters
currently-reading.css?ver=currently-reading.js?ver=

HTML / DOM Fingerprints

CSS Classes
currentlyreadingreading_widget
HTML Comments
Using Google's Book APICache file is Cache file read...Google Books API call successful... Write cache file.+5 more
Data Attributes
id='currenlyreading-ISBNid='currenlyreading-ISBN-img'-moz-box-shadow:-webkit-box-shadow:-khtml-box-shadow:box-shadow:
FAQ

Frequently Asked Questions about Currently Reading