Enhanced Header / Footer Injections Security & Risk Analysis

wordpress.org/plugins/enhanced-header-footer-injections

Add code to the header and footer sections of your site on a page-per-page basis.

100 active installs v0.2 PHP + WP 3.1+ Updated Mar 24, 2012
ehfiscriptsstyleswp_footerwp_head
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enhanced Header / Footer Injections Safe to Use in 2026?

Generally Safe

Score 85/100

Enhanced Header / Footer Injections has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "enhanced-header-footer-injections" v0.2 plugin exhibits a concerning security posture despite a lack of recorded historical vulnerabilities or critical taint analysis findings. The static analysis reveals a significant weakness: 100% of output operations are not properly escaped. This is a substantial risk, as unescaped output can lead to Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website's content, which could then be executed in the browsers of other users.

While the plugin has no identified CVEs and a seemingly clean vulnerability history, this does not negate the present risks identified in the code. The absence of critical taint flows and dangerous functions is a positive sign, but it is overshadowed by the critical flaw in output sanitization. The plugin also lacks nonce checks on its limited entry points, which, although few, are still points of potential exploitation if any interaction were to occur.

In conclusion, the plugin has strengths in its minimal attack surface, use of prepared statements for SQL, and presence of capability checks. However, the widespread lack of output escaping presents a high risk of XSS vulnerabilities. This should be addressed as a priority to improve the plugin's overall security.

Key Concerns

  • 100% of outputs not properly escaped
  • No nonce checks on entry points
Vulnerabilities
None known

Enhanced Header / Footer Injections Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Enhanced Header / Footer Injections Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
75
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped75 total outputs
Attack Surface

Enhanced Header / Footer Injections Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_enqueue_scriptsehfi-init.php:49
actionadmin_initehfi-init.php:50
actionadmin_menuehfi-init.php:51
actionadd_meta_boxesehfi-init.php:53
actionsave_postehfi-init.php:54
actionwp_headehfi-init.php:56
actionwp_footerehfi-init.php:57
Maintenance & Trust

Enhanced Header / Footer Injections Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedMar 24, 2012
PHP min version
Downloads16K

Community Trust

Rating66/100
Number of ratings7
Active installs100
Developer Profile

Enhanced Header / Footer Injections Developer Profile

chriscarvache

3 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enhanced Header / Footer Injections

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enhanced-header-footer-injections/css/jquery-ui-1.8.16.custom.css/wp-content/plugins/enhanced-header-footer-injections/js/ehfi.js
Script Paths
/wp-content/plugins/enhanced-header-footer-injections/js/ehfi.js

HTML / DOM Fingerprints

Data Attributes
nlws_ehfi_meta
FAQ

Frequently Asked Questions about Enhanced Header / Footer Injections