Divelogs Widget Security & Risk Analysis

wordpress.org/plugins/divelogs-widget

Displays your latest dive from divelogs.de in a widget

20 active installs v1.6 PHP 7.4+ WP 5.0+ Updated Dec 10, 2025
divelogsdivinglatest-divelogbookscuba
99
A · Safe
CVEs total1
Unpatched0
Last CVEDec 11, 2025
Safety Verdict

Is Divelogs Widget Safe to Use in 2026?

Generally Safe

Score 99/100

Divelogs Widget has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Dec 11, 2025Updated 3mo ago
Risk Assessment

The divelogs-widget plugin, version 1.6, presents a mixed security posture. On the positive side, the code analysis reveals a lack of dangerous functions, no raw SQL queries, and a high percentage of properly escaped output. The absence of file operations and external HTTP requests, along with a limited attack surface comprised solely of one shortcode with no explicit authentication checks indicated, are also good signs. Taint analysis shows no identified vulnerabilities, suggesting that data flows within the plugin are handled cautiously.

However, several areas raise concerns. The presence of a medium severity Cross-Site Scripting (XSS) vulnerability in its history, even though currently patched, is a significant flag. The lack of nonce checks and capability checks on any identified entry points, particularly the shortcode, creates a potential weakness. This means that even if the output is generally escaped, the plugin doesn't actively verify if the user interacting with the shortcode is authorized or if the request is legitimate, leaving it susceptible to specific types of attacks if an input vector exists.

In conclusion, while divelogs-widget has adopted some good security practices like prepared statements and output escaping, the historical XSS vulnerability and the absence of crucial security checks like nonces and capability checks on its attack surface represent notable risks that warrant attention for a more robust security posture.

Key Concerns

  • Medium severity XSS vulnerability in history
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
1

Divelogs Widget Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-13962medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Divelogs Widget <= 1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

Dec 11, 2025 Patched in 1.6 (1d)
Code Analysis
Analyzed Mar 16, 2026

Divelogs Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
52 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

91% escaped57 total outputs
Attack Surface

Divelogs Widget Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[latestdive] divelogs-widget.php:71
WordPress Hooks 1
actionwidgets_initdivelogs-widget.php:19
Maintenance & Trust

Divelogs Widget Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 10, 2025
PHP min version7.4
Downloads3K

Community Trust

Rating66/100
Number of ratings3
Active installs20
Developer Profile

Divelogs Widget Developer Profile

klemmkeil

2 plugins · 30 total installs

100
trust score
Avg Security Score
100/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Divelogs Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/divelogs-widget/divelogs-widget.php

HTML / DOM Fingerprints

CSS Classes
divelogs-widget
Data Attributes
id="divelogs_widget"
Shortcode Output
<script src="https://divelogs.org/mylatestdivebig.php<script src="https://www.divelogs.de/mylatestdivebig.php<script src="https://fr.divelogs.de/mylatestdivebig.php<script src="https://nl.divelogs.de/mylatestdivebig.php
FAQ

Frequently Asked Questions about Divelogs Widget