
E-namad & Shamed Logo Manager Security & Risk Analysis
wordpress.org/plugins/e-namad-shamed-logo-managerThis plugin helps you to easily put the logo of E-namad, Shamed and Zarrinpal on your website
Is E-namad & Shamed Logo Manager Safe to Use in 2026?
Use With Caution
Score 63/100E-namad & Shamed Logo Manager has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.
The e-namad-shamed-logo-manager plugin v2.2 exhibits a mixed security posture. While the static analysis shows positive signs like 100% of SQL queries using prepared statements and no detected dangerous functions or file operations, there are significant concerns. The plugin has a known medium severity Cross-Site Scripting (XSS) vulnerability that is currently unpatched, indicating a potential for attackers to inject malicious scripts into the application. Furthermore, the absence of nonce checks and capability checks across its entry points is a critical weakness, as it allows unauthorized users to trigger actions or access data that should be protected. The 65% proper output escaping suggests that some content displayed to users might be vulnerable to XSS attacks if not handled carefully by the remaining 35% of outputs.
The vulnerability history clearly points to a recurring issue with XSS vulnerabilities, and the presence of an unpatched medium severity CVE is a direct and immediate risk. The static analysis, while highlighting some good practices in database interaction, fails to identify any taint flows, which might be due to the analysis scope or a lack of complex data handling. However, the lack of authorization checks on all entry points (shortcodes in this case) is a glaring omission that attackers can readily exploit. The total attack surface is small, but the lack of security on these entry points negates this advantage.
In conclusion, despite some positive coding practices in handling SQL and avoiding dangerous functions, the e-namad-shamed-logo-manager plugin v2.2 poses a significant risk due to an unpatched XSS vulnerability and a complete lack of authorization checks on its shortcodes. The history of XSS vulnerabilities further exacerbates this risk, suggesting a potential for ongoing security issues. Immediate patching of the known CVE and implementation of proper authorization and nonce checks on all entry points are strongly recommended.
Key Concerns
- Unpatched medium severity CVE
- Lack of nonce checks on entry points
- Lack of capability checks on entry points
- Insufficient output escaping (35%)
E-namad & Shamed Logo Manager Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
E-namad & Shamed Logo Manager <= 2.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
E-namad & Shamed Logo Manager Code Analysis
Output Escaping
E-namad & Shamed Logo Manager Attack Surface
Shortcodes 4
WordPress Hooks 7
Maintenance & Trust
E-namad & Shamed Logo Manager Maintenance & Trust
Maintenance Signals
Community Trust
E-namad & Shamed Logo Manager Alternatives
E-namad & Shamed Logo Manager Developer Profile
2 plugins · 3K total installs
How We Detect E-namad & Shamed Logo Manager
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/e-namad-shamed-logo-manager/widget/class-widget-all.php/wp-content/plugins/e-namad-shamed-logo-manager/widget/class-widget-enamad.php/wp-content/plugins/e-namad-shamed-logo-manager/widget/class-widget-shamed.php/wp-content/plugins/e-namad-shamed-logo-manager/widget/class-widget-zarrin.php/wp-content/plugins/e-namad-shamed-logo-manager/templates/option-page.phpe-namad-shamed-logo-manager/style.css?ver=e-namad-shamed-logo-manager/script.js?ver=HTML / DOM Fingerprints
ywp-esl-logo-containerdata-enamad-logodata-shamed-logodata-zarrinpal-logowindow.ywp_esl_logos_data[enamadlogo_shortcode][shamedlogo_shortcode][zarrinpallogo_shortcode][ywp_esl_logos]