D64 LSR-Stopper Security & Risk Analysis

wordpress.org/plugins/d64-lsr-stopper

Mit diesem Plugin verhinderst du Verlinkungen zu Medien, deren Verlage das Leistungsschutzrecht unterstützen bzw. in Anspruch nehmen.

20 active installs v1.0.4 PHP + WP 3.3+ Updated Dec 20, 2013
campaignpolitics
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is D64 LSR-Stopper Safe to Use in 2026?

Generally Safe

Score 85/100

D64 LSR-Stopper has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of "d64-lsr-stopper" v1.0.4 reveals a generally secure foundation, with no identified vulnerabilities in its limited attack surface. The plugin does not expose any AJAX handlers, REST API routes, shortcodes, or cron events without proper authorization checks, which is a significant strength. Furthermore, all SQL queries are properly prepared, indicating good database interaction practices. The absence of any known CVEs in its vulnerability history is also a positive sign, suggesting a history of responsible development.

However, there are notable concerns. The most critical finding is that 100% of the output from the plugin is not properly escaped. This presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the WordPress admin area or even the front-end of a website. The plugin also performs a file operation and an external HTTP request, which, without further context on their implementation, could potentially be exploited if not handled with strict sanitization and validation. The complete lack of nonce and capability checks on its entry points, while currently not an issue due to the absence of such points, highlights a potential gap in future extensibility if new entry points are added without security considerations.

In conclusion, while "d64-lsr-stopper" v1.0.4 benefits from a minimal attack surface and secure SQL handling, the unescaped output is a critical weakness that requires immediate attention. The vulnerability history is clean, which is encouraging, but the static analysis clearly points to a specific, high-impact vulnerability that could be exploited.

Key Concerns

  • Output is not properly escaped
  • Capability checks are missing
  • Nonce checks are missing
Vulnerabilities
None known

D64 LSR-Stopper Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

D64 LSR-Stopper Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

D64 LSR-Stopper Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_footerd64-lsr-stopper.php:129
actionactivity_box_endd64-lsr-stopper.php:130
filterthe_contentd64-lsr-stopper.php:131
filtercomment_textd64-lsr-stopper.php:132
Maintenance & Trust

D64 LSR-Stopper Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 20, 2013
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

D64 LSR-Stopper Developer Profile

Dennis

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect D64 LSR-Stopper

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p><strong>Schutz gegen das Leistungschutzrecht ist aktiv.</strong>
FAQ

Frequently Asked Questions about D64 LSR-Stopper