Easy Security & Risk Analysis

wordpress.org/plugins/easy

Easy, but complex widget website builder.

40 active installs v0.9.9.3 PHP + WP 4.3+ Updated Jul 13, 2016
adminlooppagepostwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Easy Safe to Use in 2026?

Generally Safe

Score 85/100

Easy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin "easy" v0.9.9.3 exhibits a generally strong security posture based on the provided static analysis. The absence of detectable AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code signals indicate good practices such as using prepared statements for all SQL queries, and a majority of output escaping is properly handled. The single capability check also suggests some level of access control is in place.

However, there are a few areas that warrant attention. The lack of nonce checks is a notable concern, as this can leave the plugin vulnerable to Cross-Site Request Forgery (CSRF) attacks if any actions are performed without proper validation. While the taint analysis shows no critical or high severity issues, this is based on zero flows analyzed, which could be due to a small codebase or limitations of the analysis tool. The absence of any recorded vulnerabilities in its history is a positive indicator of past security diligence, but it does not guarantee future security.

In conclusion, "easy" v0.9.9.3 demonstrates several good security practices, particularly in its limited attack surface and SQL query handling. The primary weakness identified is the lack of nonce checks. While the vulnerability history is clean, the potential for un-analyzed taint flows or undiscovered CSRF vectors means ongoing vigilance is still advisable.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Easy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Easy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
9 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

69% escaped13 total outputs
Attack Surface

Easy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwidgets_init2046-easy.php:19
actionadmin_print_styles-widgets.php2046-easy.php:986
actioninit2046-easy.php:1047
Maintenance & Trust

Easy Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 13, 2016
PHP min version
Downloads27K

Community Trust

Rating100/100
Number of ratings8
Active installs40
Developer Profile

Easy Developer Profile

2046

6 plugins · 140 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Easy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/easy/includes/admin/css/easy.style.css/wp-content/plugins/easy/includes/admin/css/easy.admin.css/wp-content/plugins/easy/includes/admin/js/easy.admin.js/wp-content/plugins/easy/includes/admin/js/colorpicker.js/wp-content/plugins/easy/includes/admin/js/jscolor.js
Script Paths
/wp-content/plugins/easy/includes/admin/js/easy.admin.js/wp-content/plugins/easy/includes/admin/js/colorpicker.js/wp-content/plugins/easy/includes/admin/js/jscolor.js
Version Parameters
easy/includes/admin/css/easy.style.css?ver=easy/includes/admin/css/easy.admin.css?ver=easy/includes/admin/js/easy.admin.js?ver=easy/includes/admin/js/colorpicker.js?ver=easy/includes/admin/js/jscolor.js?ver=

HTML / DOM Fingerprints

CSS Classes
easy_2046_lwbuilder_2046_main_loop
Data Attributes
id="the_widget_id_.*"data-idbase="builder_2046_main_loop-widget"
JS Globals
Easy_2046_builder
FAQ

Frequently Asked Questions about Easy