Custom Howdy Security & Risk Analysis

wordpress.org/plugins/custom-howdy

Not everyone wants to see 'Howdy, ' on their WordPress admin screen. This allows you to customize it to whatever you choose.

10 active installs v1.0 PHP + WP 4.6.1+ Updated Jan 4, 2017
admin-screenchange-howdycustom-howdyhowdyremove-howdy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Howdy Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Howdy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "custom-howdy" plugin version 1.0 exhibits a generally good security posture based on the static analysis. It has a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests is a positive indicator. The consistent use of prepared statements for all SQL queries is a strong defense against SQL injection vulnerabilities.

However, there are areas for concern. While the attack surface is small, the lack of any authorization checks (capability checks, nonce checks) on any potential entry points is a significant weakness. The fact that 50% of identified output statements are not properly escaped also presents a risk of Cross-Site Scripting (XSS) vulnerabilities, especially if any of the data originates from user input, which is not fully assessed by the provided taint analysis data. The vulnerability history is clean, which is a positive sign, but it could also indicate that the plugin has not been subjected to rigorous testing or that the current version is too new to have accumulated issues.

In conclusion, "custom-howdy" v1.0 demonstrates good development practices in areas like SQL handling and avoiding risky functions. Nevertheless, the complete absence of authorization checks and the presence of unescaped output create exploitable pathways. The lack of historical vulnerabilities could be misleading. Addressing the missing authorization and output escaping measures is crucial for improving its security.

Key Concerns

  • No nonce checks on any entry points
  • No capability checks on any entry points
  • 50% of output statements are not properly escaped
Vulnerabilities
None known

Custom Howdy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Howdy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Attack Surface

Custom Howdy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initcustomhowdy.php:23
actionadmin_menucustomhowdy.php:65
filtergettextcustomhowdy.php:213
Maintenance & Trust

Custom Howdy Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 4, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Custom Howdy Developer Profile

csheridan

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Howdy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
customhowdy-op-wrappercustomhowdy-message
HTML Comments
StylingSAVE NOTIFICATION UPON SUBMITSUBMIT BUTTONSUBMIT BUTTON HOVER+4 more
Data Attributes
name="customhowdy_plugin_op[customhowdy_change_message]"id="customhowdy-message"name="customhowdy_plugin_op[submit-customhowdy-op]"
Shortcode Output
Welcome to Custom HowdyEnter your new WordPress greeting below.SUBMIT
FAQ

Frequently Asked Questions about Custom Howdy