Dynamic Siteurl For Widget Security & Risk Analysis

wordpress.org/plugins/dynamic-siteurl-for-widget

Need to change the site url dynamically while migrating the widget to live site this plugin is the ultimate solution

10 active installs v1.0.0 PHP 5.2.4+ WP 4.0+ Updated Apr 24, 2018
dynamicdynamic-variablesite-urlwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dynamic Siteurl For Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Dynamic Siteurl For Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "dynamic-siteurl-for-widget" plugin, version 1.0.0, presents a generally favorable initial security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the potential attack surface. Furthermore, the absence of dangerous functions, raw SQL queries (all using prepared statements), file operations, and external HTTP requests is commendable. The plugin also shows no history of known vulnerabilities, suggesting a well-maintained or less complex codebase.

However, a critical concern arises from the output escaping analysis, which indicates that 100% of the total outputs are not properly escaped. This is a significant weakness that could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is ever rendered directly in the output. While the static analysis and taint analysis report no flows or specific vulnerabilities, the lack of output escaping is a foundational security practice that is entirely missing. The absence of nonce and capability checks also means that even if there were entry points, they might not be adequately protected against unauthorized actions.

In conclusion, while the plugin boasts a small attack surface and a clean vulnerability history, the complete lack of output escaping is a serious oversight that exposes it to XSS risks. The absence of authentication checks further exacerbates this. Developers should prioritize addressing the output escaping issue to improve the plugin's overall security.

Key Concerns

  • 100% of outputs unescaped
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Dynamic Siteurl For Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Dynamic Siteurl For Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Dynamic Siteurl For Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menudynamic-widget-variables.php:23
actionadmin_initdynamic-widget-variables.php:25
filterwidget_textfunctions.php:13
Maintenance & Trust

Dynamic Siteurl For Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 24, 2018
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Dynamic Siteurl For Widget Developer Profile

shouryawp

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dynamic Siteurl For Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
sb-option-blockdwv_tablesubmit-btn
Data Attributes
id="dwv_settings"name="dwv_settings"
FAQ

Frequently Asked Questions about Dynamic Siteurl For Widget