Custom Comment Security & Risk Analysis

wordpress.org/plugins/customcomment

This plugin lets you define more fields for comment to let your visitors include their facebook, twitter and ... in their comments

40 active installs v2.1.6 PHP + WP 2.7+ Updated Oct 15, 2011
commentcomment-customizationcomment-fieldcustom-commentcustomize-comment
42
D · High Risk
CVEs total2
Unpatched2
Last CVEAug 20, 2025
Safety Verdict

Is Custom Comment Safe to Use in 2026?

High Risk

Score 42/100

Custom Comment carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.

2 known CVEs 2 unpatched Last CVE: Aug 20, 2025Updated 14yr ago
Risk Assessment

The "customcomment" plugin v2.1.6 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and implementing nonce and capability checks on its single AJAX handler. This suggests an awareness of common security pitfalls related to database interactions and access control.

However, significant concerns arise from the static analysis. The most critical finding is that 0% of output escaping is properly implemented, meaning any data displayed back to users could be vulnerable to Cross-Site Scripting (XSS) attacks. The taint analysis also revealed one flow with an unsanitized path, which could potentially be exploited if an attacker can control the input leading to that path. The vulnerability history further compounds these concerns, with two unpatched medium severity CVEs, both related to Cross-Site Scripting. This pattern indicates a recurring issue with input sanitization and output escaping within the plugin.

In conclusion, while the plugin has some strengths in areas like database security and access control, the critical lack of output escaping and the persistent XSS vulnerabilities in its history present a substantial risk. Attackers could leverage these weaknesses to inject malicious scripts, potentially leading to session hijacking, defacement, or other malicious activities. Immediate attention is required to address the output escaping deficiencies and the unpatched vulnerabilities.

Key Concerns

  • Unpatched CVEs (2 medium)
  • Output escaping: 0% properly escaped
  • Taint flow with unsanitized paths
Vulnerabilities
2

Custom Comment Security Vulnerabilities

CVEs by Year

2 CVEs in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-48365medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Custom Comment <= 2.1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting

Aug 20, 2025Unpatched
CVE-2025-49889medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Custom Comment <= 2.1.6 - Authenticated (Administrator+) Stored Cross-Site Scripting

Aug 17, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Custom Comment Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
CComment_option_page (CustomComment.php:180)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Custom Comment Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_CComment-submitCustomComment.php:28
WordPress Hooks 7
actioninitCustomComment.php:27
actioncomment_form_after_fieldsCustomComment.php:30
actioncomment_form_logged_in_afterCustomComment.php:31
actioncomment_postCustomComment.php:32
actionadmin_menuCustomComment.php:33
actiondelete_commentCustomComment.php:34
filtercomment_authorCustomComment.php:35
Maintenance & Trust

Custom Comment Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedOct 15, 2011
PHP min version
Downloads8K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Custom Comment Developer Profile

imaprogrammer

2 plugins · 60 total installs

69
trust score
Avg Security Score
64/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Comment

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/customcomment/js/CComment.js
Script Paths
/wp-content/plugins/customcomment/js/CComment.js

HTML / DOM Fingerprints

CSS Classes
required
Data Attributes
name="CuCo_"id="CuCo_"
JS Globals
CComment_ajax_var
FAQ

Frequently Asked Questions about Custom Comment