Custom Simple Rss Security & Risk Analysis

wordpress.org/plugins/custom-simple-rss

A plugin to create your own Custom Simple RSS Feed according to parameters you choose

2K active installs v2.1.3 PHP + WP 4.0.1+ Updated Apr 5, 2021
custom-feedcustom-rssfeedrss
85
A · Safe
CVEs total1
Unpatched0
Last CVEJul 27, 2019
Download
Safety Verdict

Is Custom Simple Rss Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Simple Rss has a strong security track record. Known vulnerabilities have been patched promptly. It's a solid choice for most WordPress installations.

1 known CVELast CVE: Jul 27, 2019Updated 5yr ago
Risk Assessment

The custom-simple-rss plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no identified attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events. This indicates a deliberate effort to limit potential entry points. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are excellent security practices. The presence of a nonce check is also a good sign for input validation. However, a significant concern is the low percentage of properly escaped output (39%). This suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data or dynamic content might be rendered directly in the browser without adequate sanitization. The vulnerability history, while currently showing no unpatched CVEs, does list a past medium severity vulnerability, which was a Cross-Site Request Forgery (CSRF). While this specific vulnerability is patched, it indicates a past weakness that could be exploited if similar patterns resurface.

In conclusion, while the plugin has strengths in its limited attack surface and secure database interactions, the prevalent issue with output escaping presents a substantial risk. The past CSRF vulnerability also warrants attention to ensure robust input validation moving forward. The plugin would benefit greatly from improved output sanitization to mitigate XSS risks.

Key Concerns

  • Low percentage of properly escaped output
  • Past medium severity vulnerability (CSRF)
Vulnerabilities
1 published

Custom Simple Rss Security Vulnerabilities

CVEs by Year

1 CVE in 2019
2019
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2019-14327medium · 6.5Cross-Site Request Forgery (CSRF)

Custom Simple RSS < 2.0.7 - Cross-Site Request Forgery

Jul 27, 2019 Patched in 2.0.7 (1641d)
Version History

Custom Simple Rss Release Timeline

v2.1.3Current
v2.1.0
v2.0.9
v2.0.61 CVE
v2.0.51 CVE
v2.0.41 CVE
v2.0.31 CVE
v2.0.21 CVE
v1.8.11 CVE
v1.81 CVE
v1.7.11 CVE
v1.71 CVE
v1.6.51 CVE
v1.6.11 CVE
v1.61 CVE
v1.5.11 CVE
v1.51 CVE
v1.4.11 CVE
v1.41 CVE
v1.31 CVE
Code Analysis
Analyzed Mar 16, 2026

Custom Simple Rss Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
63
41 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

39% escaped104 total outputs
Data Flows · Security
All sanitized

Data Flow Analysis

2 flows
custom_simple_rss_get_form_data (custom-simple-rss-admin.php:91)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Simple Rss Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menucustom-simple-rss-admin.php:22
actionadmin_enqueue_scriptscustom-simple-rss-admin.php:30
filterplugin_action_linkscustom-simple-rss.php:24
filterexcerpt_morecustom-simple-rss.php:350
filterexcerpt_morecustom-simple-rss.php:623
filterquery_varscustom-simple-rss.php:807
actionparse_requestcustom-simple-rss.php:813
Maintenance & Trust

Custom Simple Rss Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedApr 5, 2021
PHP min version
Downloads45K

Community Trust

Rating98/100
Number of ratings14
Active installs2K
Developer Profile

Custom Simple Rss Developer Profile

danikoo

1 plugin · 2K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
1641 days
View full developer profile
Detection Fingerprints

How We Detect Custom Simple Rss

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-simple-rss/custom-simple-rss-admin.css/wp-content/plugins/custom-simple-rss/custom-simple-rss-admin.js/wp-content/plugins/custom-simple-rss/custom-simple-rss-frontend.css/wp-content/plugins/custom-simple-rss/custom-simple-rss-frontend.js
Script Paths
/wp-content/plugins/custom-simple-rss/custom-simple-rss-admin.js/wp-content/plugins/custom-simple-rss/custom-simple-rss-frontend.js
Version Parameters
custom-simple-rss/custom-simple-rss-admin.css?ver=custom-simple-rss/custom-simple-rss-admin.js?ver=custom-simple-rss/custom-simple-rss-frontend.css?ver=custom-simple-rss/custom-simple-rss-frontend.js?ver=

HTML / DOM Fingerprints

CSS Classes
custom-simple-rss-contentcustom-simple-rss-thumbnail
HTML Comments
<!-- start custom simple rss --><!-- end custom simple rss -->
JS Globals
customSimpleRSS
Shortcode Output
[custom_simple_rss][custom-simple-rss]
FAQ

Frequently Asked Questions about Custom Simple Rss