Dice Roller Security & Risk Analysis

wordpress.org/plugins/dice-widget

Adds a simple dice roller widget that you can add to your sidebar

10 active installs v1.4 PHP + WP 3.0.1+ Updated Mar 31, 2016
dicerandomrollersidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dice Roller Safe to Use in 2026?

Generally Safe

Score 85/100

Dice Roller has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "dice-widget" v1.4 plugin exhibits a mixed security posture. On one hand, the static analysis indicates a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no dangerous functions, SQL queries that are not using prepared statements, file operations, external HTTP requests, or bundled libraries. This suggests good development practices in these specific areas.

However, a significant concern arises from the complete lack of output escaping. With 27 total outputs and 0% properly escaped, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered by the widget, if not rigorously sanitized by the calling context, could be exploited to inject malicious scripts. The absence of nonce and capability checks on the identified entry points, though few, also contributes to potential security weaknesses. The vulnerability history being clean is a positive sign, but it does not negate the critical flaws identified in the code analysis.

In conclusion, while the plugin has avoided common pitfalls like unpatched CVEs or raw SQL queries, the pervasive lack of output escaping is a severe security flaw that requires immediate attention. The absence of checks on entry points further exacerbates this risk. The overall security posture is weakened by these critical oversights, despite the otherwise lean attack surface and use of prepared statements.

Key Concerns

  • Unescaped output on all outputs
  • Missing capability checks on entry points
  • Missing nonce checks on entry points
Vulnerabilities
None known

Dice Roller Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dice Roller Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
27
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped27 total outputs
Attack Surface

Dice Roller Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initdice_widget.php:18
Maintenance & Trust

Dice Roller Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 31, 2016
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Dice Roller Developer Profile

kevinodie

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dice Roller

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dice-widget/dice_widget.css/wp-content/plugins/dice-widget/dice_widget.js
Script Paths
/wp-content/plugins/dice-widget/dice_widget.js
Version Parameters
dice_widget/dice_widget.css?ver=dice_widget/dice_widget.js?ver=

HTML / DOM Fingerprints

CSS Classes
Dice
Data Attributes
id="dice-widget"
Shortcode Output
<p>Result: %de%d = %d (%d explosions)</p><p>Result: %de%d+%%d = %d (%d explosions)</p><p>Result: %dd%d = %d</p><p>Result: %dd%d+%%d = %d</p>
FAQ

Frequently Asked Questions about Dice Roller