FAQ Security & Risk Analysis

wordpress.org/plugins/custom-faq

FAQ Module is very much usefull to provide a query solution of n number of system users.

20 active installs v1.0 PHP + WP 3.7+ Updated Jul 3, 2018
commentsfaqfrequently-asked-questionspixeltowebspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FAQ Safe to Use in 2026?

Generally Safe

Score 85/100

FAQ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "custom-faq" plugin v1.0 exhibits a mixed security posture. While it demonstrates good practices by avoiding dangerous functions, using prepared statements for all SQL queries, and having no known vulnerabilities or external HTTP requests, significant concerns arise from its attack surface and output handling. The presence of two AJAX handlers without authentication checks is a critical oversight, creating a readily exploitable entry point for unauthorized actions. Furthermore, the complete lack of output escaping means that any data displayed to users, especially if it originates from user input, is susceptible to cross-site scripting (XSS) attacks. The absence of any recorded vulnerability history could indicate a lack of targeting or a recent release, but it does not negate the immediate risks presented by the current code.

Key Concerns

  • AJAX handlers without authentication checks
  • Output escaping is not implemented
  • No nonce checks on AJAX handlers
  • No capability checks on entry points
Vulnerabilities
None known

FAQ Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FAQ Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<function> (includes\function.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

FAQ Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_loadfaqfaq.php:19
noprivwp_ajax_loadfaqfaq.php:20

Shortcodes 1

[custom_faq] faq.php:16
WordPress Hooks 4
actioninitfaq.php:14
actionwp_enqueue_scriptsfaq.php:15
actioninitfaq.php:17
actionwp_print_scriptsfaq.php:18
Maintenance & Trust

FAQ Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedJul 3, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

FAQ Developer Profile

pixeltoweb

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FAQ

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-faq/js/accordion.js/wp-content/plugins/custom-faq/css/demo.css/wp-content/plugins/custom-faq/css/defaults.css/wp-content/plugins/custom-faq/js/function.js
Script Paths
/wp-content/plugins/custom-faq/js/accordion.js/wp-content/plugins/custom-faq/js/function.js
Version Parameters
custom-faq/css/defaults.css?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
accordionaccordion-sectionaccordion-section-titleaccordion-section-content
Data Attributes
href="#accordion-
JS Globals
faq_ajax_script
Shortcode Output
<div class="accordion"><div class="accordion-section"><a class="accordion-section-title" href="#accordion-<div id="accordion-
FAQ

Frequently Asked Questions about FAQ