Random Bible Verse Widget Security & Risk Analysis

wordpress.org/plugins/ehw-random-bible-verse

Displays random Bible verse on page-load and refresh with widget.

0 active installs v0.1.2 PHP 7.4.26+ WP 5.9+ Updated Feb 18, 2022
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random Bible Verse Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Random Bible Verse Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "ehw-random-bible-verse" plugin v0.1.2 exhibits a generally strong security posture based on the provided static analysis. It demonstrates good practices by having no identified dangerous functions, no file operations, and all SQL queries utilize prepared statements. The high percentage of properly escaped output further reduces the risk of cross-site scripting vulnerabilities. Crucially, the plugin reports zero known CVEs and a clean vulnerability history, indicating a lack of past security issues and a diligent approach to maintenance if any were discovered.

Despite these strengths, there are a few areas for concern. The complete absence of nonce checks and capability checks across all entry points is a significant weakness. While the static analysis reports zero AJAX handlers, REST API routes, shortcodes, and cron events, this might be an incomplete picture. If any of these entry points were to be introduced or are implicitly handled, the lack of authentication and authorization checks would create direct vulnerabilities. The total lack of taint analysis results, while potentially indicating no issues, could also mean the analysis was not comprehensive enough to detect potential vulnerabilities. The attack surface is reported as zero, which is a positive sign but hinges on the accuracy of the analysis in identifying all potential interaction points.

In conclusion, the "ehw-random-bible-verse" plugin currently presents a low risk profile due to its clean vulnerability history and good code practices regarding SQL and output escaping. However, the complete lack of any authentication or authorization checks on potential entry points represents a latent risk. If the plugin were to evolve and introduce user-interactive features, this oversight would need immediate attention. The current lack of detected vulnerabilities is a positive indicator but should be monitored, especially if the attack surface were to expand.

Key Concerns

  • No nonce checks on any entry points
  • No capability checks on any entry points
  • No taint analysis performed or no results
Vulnerabilities
None known

Random Bible Verse Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Random Bible Verse Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
34 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

92% escaped37 total outputs
Attack Surface

Random Bible Verse Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initehw-randverse.php:34
actionwp_enqueue_scriptsincludes\ehw-randverse-scripts.php:16
Maintenance & Trust

Random Bible Verse Widget Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedFeb 18, 2022
PHP min version7.4.26
Downloads693

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

Random Bible Verse Widget Alternatives

No alternatives data available yet.

Developer Profile

Random Bible Verse Widget Developer Profile

Eric Hepperle

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Random Bible Verse Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ehw-random-bible-verse/css/style.css/wp-content/plugins/ehw-random-bible-verse/js/main.js
Script Paths
/wp-content/plugins/ehw-random-bible-verse/js/main.js

HTML / DOM Fingerprints

CSS Classes
ehw-rbv
HTML Comments
ehw-randverse-scripts.php ehw-randverse_tmpl__out.php DEFINE VERSES ARRAY: NOTE: All Bible verses taken from King James Bible: Pure Cambridge Edition (PCE) via https://openbible.com/ - Retrieved 02/15/22 - License: As per bibleprotector.com, the PCE Edition of the King James Bible is public domain, and thus free to use: "The standard King James Bible was originally presented by Cambridge University Press, and the Pure Cambridge Edition that was historically published by Cambridge University is in the public domain, though it gained its authority to publish it from Crown of Great Britain. The Pure Cambridge Edition can and should be published and produced by anyone without restriction, except absolute accuracy." -- https://www.bibleprotector.com/GUIDE_TO_PCE.pdf Additonal verses that are different in PCE, as per http://www.bibleprotector.com/forum/viewtopic.php?f=8&t=85: +3 more
Shortcode Output
<section class='ehw-rbv'><h3>
FAQ

Frequently Asked Questions about Random Bible Verse Widget