Display Authors Widget Security & Risk Analysis

wordpress.org/plugins/display-authors-widget

Display authors by role.

100 active installs v1.1.1 PHP + WP 4.0+ Updated Jul 4, 2015
authorauthorsmultiwidgetwidget-only
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Display Authors Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Display Authors Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "display-authors-widget" plugin version 1.1.1 exhibits a generally good security posture, primarily due to its minimal attack surface and lack of known vulnerabilities. The analysis reveals no external entry points like AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or permission checks, which is a significant strength. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, reducing the potential for common attack vectors.

However, there are areas of concern. The use of the deprecated `create_function` is a red flag, as it can be a source of security vulnerabilities if not handled with extreme care, although in this specific case, no taint flows were detected. More critically, only 5% of output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. With 43 total outputs, this means a substantial number are likely vulnerable to attackers injecting malicious scripts.

Given the absence of known CVEs and a clean vulnerability history, the plugin appears to have been developed with some security awareness. However, the significant number of unescaped outputs presents a clear and present danger that could be easily exploited. The plugin's strengths lie in its limited attack surface and safe database interactions, but the output escaping deficiency represents a major weakness that needs immediate attention.

Key Concerns

  • Insufficient output escaping
  • Use of deprecated create_function
Vulnerabilities
None known

Display Authors Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Display Authors Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
41
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "Display_Authors_Widget" );' ) );display-authors-widget.php:265

Output Escaping

5% escaped43 total outputs
Attack Surface

Display Authors Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwidgets_initdisplay-authors-widget.php:265
actionplugins_loadeddisplay-authors-widget.php:268
actionwp_enqueue_scriptsdisplay-authors-widget.php:281
Maintenance & Trust

Display Authors Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedJul 4, 2015
PHP min version
Downloads17K

Community Trust

Rating88/100
Number of ratings5
Active installs100
Developer Profile

Display Authors Widget Developer Profile

Sami Keijonen

5 plugins · 230 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Display Authors Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/display-authors-widget/display-authors-widget.php

HTML / DOM Fingerprints

CSS Classes
display-authors-widgetauthor-profiledisplay-authors-widget-alignleftdisplay-authors-widget-alignright
Data Attributes
id="hcard-class="author-profile vcard clear"class="display-authors-widget-id="display-authors-widgetname="display-authors-widget
FAQ

Frequently Asked Questions about Display Authors Widget