Custom Excerpts Security & Risk Analysis

wordpress.org/plugins/custom-excerpts

Custom Excerpts allows you to create a custom excerpt length, choose HTML tags to allow and whether to make the link nofollow or dofollow.

50 active installs v1.0.1 PHP + WP 2.3+ Updated Feb 1, 2009
excerptexcerptspost-lengthpoststemplate-tags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Excerpts Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Excerpts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "custom-excerpts" plugin v1.0.1 demonstrates a generally good security posture regarding its attack surface and the use of prepared statements for SQL queries. The absence of AJAX handlers, REST API routes, shortcodes, cron events, and file operations significantly reduces the potential entry points for attackers. Furthermore, the reported zero known CVEs and a clean vulnerability history suggest a stable and well-maintained codebase.

However, a significant concern arises from the output escaping analysis. With 100% of detected outputs not being properly escaped, this plugin presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by this plugin that originates from user input or external sources could be injected with malicious scripts. The lack of capability checks and nonce checks, while not directly flagged as risks due to the limited entry points, also represent a missed opportunity for robust authentication and authorization, which could become critical if new entry points were introduced in future versions.

In conclusion, while the plugin benefits from a small attack surface and secure SQL practices, the unescaped output is a critical flaw that requires immediate attention. The vulnerability history is positive, but the current static analysis findings highlight a specific and exploitable weakness.

Key Concerns

  • Unescaped output detected
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Custom Excerpts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Excerpts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Custom Excerpts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_excerptcustom_excerpts.php:20
actionadmin_menucustom_excerpts.php:21
Maintenance & Trust

Custom Excerpts Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedFeb 1, 2009
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs50
Developer Profile

Custom Excerpts Developer Profile

Seans0n

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Excerpts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="ce_html"name="ce_length"name="ce_moretext"name="ce_nofollow"value="Yes"value="No"+3 more
FAQ

Frequently Asked Questions about Custom Excerpts