Custom field finder Security & Risk Analysis

wordpress.org/plugins/custom-field-finder

Allows you to easily find the custom fields (including hidden custom fields) and their values for a post, page or custom post type post.

2K active installs v0.4 PHP + WP 6.7+ Updated Dec 1, 2025
custom-fields
98
A · Safe
CVEs total1
Unpatched0
Last CVEApr 25, 2024
Safety Verdict

Is Custom field finder Safe to Use in 2026?

Generally Safe

Score 98/100

Custom field finder has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 25, 2024Updated 4mo ago
Risk Assessment

The plugin 'custom-field-finder' v0.4 exhibits a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are correctly implemented using prepared statements, and there are no file operations or external HTTP requests, which are common vectors for exploitation. The presence of a nonce check and the absence of dangerous functions are also good signs.

However, a significant concern arises from the output escaping. With 18 total outputs, only 33% are properly escaped, indicating a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This lack of proper output sanitization can allow malicious code to be injected and executed within the browser of users interacting with the plugin's output.

The vulnerability history shows a past high-severity vulnerability related to 'Deserialization of Untrusted Data,' with the last known vulnerability being recent. While currently unpatched vulnerabilities are zero, this history suggests a pattern of introducing significant security flaws. The combination of a lack of robust output escaping and a history of critical vulnerability types warrants careful attention, despite the otherwise minimal attack surface.

Key Concerns

  • Insufficient output escaping (33% properly escaped)
  • Past high-severity vulnerability (Deserialization)
Vulnerabilities
1

Custom field finder Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

High
1

1 total CVE

CVE-2024-33641high · 8.8Deserialization of Untrusted Data

Custom field finder <= 0.3 - Authenticated (Author+) PHP Object Injection

Apr 25, 2024 Patched in 0.4 (7d)
Code Analysis
Analyzed Mar 16, 2026

Custom field finder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
6 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped18 total outputs
Attack Surface

Custom field finder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menucff.php:24
Maintenance & Trust

Custom field finder Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 1, 2025
PHP min version
Downloads24K

Community Trust

Rating100/100
Number of ratings5
Active installs2K
Developer Profile

Custom field finder Developer Profile

Yoast

7 plugins · 14.2M total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
1884 days
View full developer profile
Detection Fingerprints

How We Detect Custom field finder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
cffoutputkeyvalue
Data Attributes
for="post_id"name="post_id"id="post_id"name="_wpnonce"
FAQ

Frequently Asked Questions about Custom field finder