Desire Page Widget Security & Risk Analysis

wordpress.org/plugins/desire-page-widget

This plugin allows adding a single a widget zone in your contents via shortcode.

10 active installs v1.0.1.2 PHP + WP 3.5+ Updated Unknown
layoutone-pagepagesingle-pagewidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Desire Page Widget Safe to Use in 2026?

Generally Safe

Score 100/100

Desire Page Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The desire-page-widget plugin version 1.0.1.2 exhibits a mixed security posture. On the positive side, it demonstrates good practices in handling database interactions by exclusively using prepared statements and does not engage in file operations or external HTTP requests. Furthermore, its vulnerability history is clean, with no recorded CVEs, suggesting a generally stable and well-maintained codebase or a lack of previous security scrutiny.

However, significant concerns arise from the static code analysis. The presence of the `create_function` function is a critical security risk, as it can be exploited for arbitrary code execution if improperly handled. Additionally, a low percentage of output escaping (17%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website.

While the attack surface appears small and protected by a capability check for its single shortcode, the identified code quality issues (dangerous function, insufficient output escaping) outweigh the absence of known vulnerabilities and a protected attack surface. The plugin would benefit from thorough code auditing and remediation of these specific findings to improve its overall security.

Key Concerns

  • Use of dangerous function create_function
  • Low percentage of output escaping
  • Lack of nonce checks on entry points
Vulnerabilities
None known

Desire Page Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Desire Page Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
20
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "DesireWidget" );' ) );DesirePageWidget.php:29

Output Escaping

17% escaped24 total outputs
Attack Surface

Desire Page Widget Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[desire_widget_sidebar] DesirePageWidget.php:32
WordPress Hooks 2
actionwidgets_initDesirePageWidget.php:28
actionwidgets_initDesirePageWidget.php:29
Maintenance & Trust

Desire Page Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Desire Page Widget Developer Profile

desirelabs

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Desire Page Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
desire_widget_sidebar
FAQ

Frequently Asked Questions about Desire Page Widget