Custom fields in RSS Security & Risk Analysis

wordpress.org/plugins/custom-fields-in-rss

This plugin adds post custom fields in rss feed.

10 active installs v0.1 PHP + WP 2.5+ Updated Aug 4, 2010
custom-fieldcustom-fieldsfeedrss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom fields in RSS Safe to Use in 2026?

Generally Safe

Score 85/100

Custom fields in RSS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "custom-fields-in-rss" plugin version 0.1 presents a mixed security posture. On the positive side, the static analysis indicates a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all observed SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are good practices that limit potential attack vectors. The plugin also has no recorded vulnerability history, suggesting a clean past.

However, a significant concern arises from the complete lack of output escaping. With 100% of observed outputs being unescaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities if the plugin handles any user-supplied data or dynamically generated content that is then displayed to users or within the RSS feed. Additionally, the absence of nonce and capability checks across all entry points, though currently zero, means that if any entry points were to be introduced in future updates without proper security measures, they would be immediately unprotected. This lack of foundational security checks is a notable weakness.

In conclusion, while the current version of "custom-fields-in-rss" has a minimal attack surface and uses prepared statements, the complete absence of output escaping is a critical flaw that leaves it highly susceptible to XSS attacks. The lack of security checks like nonces and capability checks on potential future entry points is also a worrying oversight. Users should proceed with extreme caution until these fundamental security issues are addressed.

Key Concerns

  • All observed outputs are unescaped
  • No nonce checks on any entry points
  • No capability checks on any entry points
Vulnerabilities
None known

Custom fields in RSS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom fields in RSS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Custom fields in RSS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionrss2_itemcustom-fields-in-rss.php:21
Maintenance & Trust

Custom fields in RSS Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedAug 4, 2010
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Custom fields in RSS Developer Profile

گناهکار

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom fields in RSS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<customfields> </customfields>
FAQ

Frequently Asked Questions about Custom fields in RSS