自定义作者名称 Security & Risk Analysis

wordpress.org/plugins/custom-author

帮助你在发布文章时自定义作者信息

50 active installs v1.2 PHP 7.0.0+ WP 4.6+ Updated Nov 3, 2018
author
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is 自定义作者名称 Safe to Use in 2026?

Generally Safe

Score 85/100

自定义作者名称 has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'custom-author' plugin v1.2 exhibits a strong security posture based on the provided static analysis. The complete absence of identified attack surface points such as AJAX handlers, REST API routes, shortcodes, and cron events, especially those without authentication or permission checks, is a significant strength. Furthermore, the code demonstrates good security practices by utilizing prepared statements for all SQL queries and implementing nonce and capability checks. The plugin also avoids potentially risky operations like file operations and external HTTP requests.

However, a notable concern is the partial output escaping. With 50% of output escaping being improperly handled, this creates a potential for cross-site scripting (XSS) vulnerabilities. While no specific taint flows or dangerous functions were identified, this lack of comprehensive escaping still presents a risk. The plugin's vulnerability history being entirely clear is a positive indicator, suggesting a history of secure development or at least no publicly disclosed issues. In conclusion, while the plugin is generally well-secured with a limited attack surface and good data handling practices, the identified output escaping issue warrants attention to mitigate XSS risks.

Key Concerns

  • Partial output escaping
Vulnerabilities
None known

自定义作者名称 Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

自定义作者名称 Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

自定义作者名称 Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionpost_submitbox_misc_actionscustom-author.php:26
actionsave_postcustom-author.php:27
filterthe_authorcustom-author.php:88
Maintenance & Trust

自定义作者名称 Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedNov 3, 2018
PHP min version7.0.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

自定义作者名称 Developer Profile

Bestony

10 plugins · 180 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect 自定义作者名称

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
misc-pub-sectionmisc-pub-section-last
HTML Comments
Copyright 2018 Bestony (email : xiqingongzi@gmail.com) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or+16 more
Data Attributes
name="_custom_author_name"value=""name="custom_author_nonce"type="text"
FAQ

Frequently Asked Questions about 自定义作者名称