Custom Widget Post Security & Risk Analysis

wordpress.org/plugins/custom-widget-post

This is a Custom Widget Post plugin. You can set manually post Title, Image and Link.

0 active installs v1.1.0 PHP + WP 4.0+ Updated Nov 2, 2022
custom-postcustom-widgetpost-customwidget-post
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Widget Post Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Widget Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "custom-widget-post" plugin v1.1.0 exhibits a generally good security posture with no recorded vulnerabilities or critical issues found in static analysis. The absence of dangerous functions, SQL queries without prepared statements, file operations, and external HTTP requests are positive indicators. Furthermore, the lack of any taint analysis findings suggests that data flow is handled securely within the plugin's scope.

However, a significant concern arises from the extremely low percentage of properly escaped output (11%). This indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data is likely being rendered directly into the browser without sufficient sanitization. The complete absence of nonce checks and capability checks, while not immediately presenting a direct threat in this analysis due to the zero attack surface, leaves the plugin vulnerable if new entry points are introduced or if the existing zero entry points are mishandled in future updates. The vulnerability history being empty is a positive sign but doesn't negate the potential risks identified in the code analysis.

In conclusion, while the plugin has avoided known historical vulnerabilities and has implemented safe practices for database queries and function usage, the pervasive lack of output escaping is a critical weakness that requires immediate attention. The potential for XSS vulnerabilities due to unsanitized output significantly outweighs the current absence of direct attack vectors. The lack of explicit authorization checks also presents a latent risk.

Key Concerns

  • Low output escaping percentage
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Custom Widget Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Custom Widget Post Release Timeline

v1.1.0Current
v1.0.9
v1.0.8
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
v1.0.0
Code Analysis
Analyzed Apr 16, 2026

Custom Widget Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
85
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

11% escaped95 total outputs
Attack Surface

Custom Widget Post Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwidgets_initCustom-Widget-Post.php:24
actionwp_enqueue_scriptsCustom-Widget-Post.php:39
actionadmin_menupage_menu.php:3
actionadmin_initpage_menu.php:261
Maintenance & Trust

Custom Widget Post Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedNov 2, 2022
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings6
Active installs0
Developer Profile

Custom Widget Post Developer Profile

Mehedi Hasan kanon

5 plugins · 320 total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Widget Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/custom-widget-post/style.php

HTML / DOM Fingerprints

CSS Classes
cwp-maincwp-main-titlecwp-postcwp-post-title
FAQ

Frequently Asked Questions about Custom Widget Post