Custom Author Byline Security & Risk Analysis

wordpress.org/plugins/custom-author-byline

Allows you to add an author name and link to the byline, other than the actual logged in user, without that custom author having to have a WordPress a …

500 active installs v1.2 PHP + WP 2.9.2+ Updated Jun 8, 2011
authorbylinecustom-authorcustom-author-bylinecustom-author-name
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Author Byline Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Author Byline has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "custom-author-byline" plugin v1.2 exhibits a generally positive security posture based on the provided static analysis. The absence of identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points suggests a limited attack surface. Furthermore, the complete reliance on prepared statements for SQL queries and the presence of nonce and capability checks are strong indicators of good security development practices. There are no recorded vulnerabilities in its history, which further bolsters confidence in its security.

However, a significant concern arises from the output escaping analysis. With three identified outputs and none being properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This weakness, coupled with the lack of any identified taint flows which might indicate incomplete analysis or simply no exploitable flows, means that while the plugin has a solid foundation, the unescaped output presents a clear and present danger. The vulnerability history showing no past issues is encouraging but does not mitigate the immediate risk of unescaped output.

In conclusion, the plugin has strengths in its limited attack surface and secure coding practices for data handling. The critical weakness lies in its output sanitization, which needs immediate attention to prevent potential XSS attacks. Future development should prioritize proper output escaping for all user-facing content.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

Custom Author Byline Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Author Byline Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

Custom Author Byline Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterthe_authorcustom-author-byline.php:21
filterauthor_linkcustom-author-byline.php:32
actionadmin_menucustom-author-byline.php:102
actionsave_postcustom-author-byline.php:103
Maintenance & Trust

Custom Author Byline Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJun 8, 2011
PHP min version
Downloads24K

Community Trust

Rating60/100
Number of ratings10
Active installs500
Developer Profile

Custom Author Byline Developer Profile

croakingtoad

3 plugins · 530 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Author Byline

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-author-byline/custom-author-byline.php

HTML / DOM Fingerprints

Data Attributes
authoruri
FAQ

Frequently Asked Questions about Custom Author Byline