
Enhanced Text Widget Security & Risk Analysis
wordpress.org/plugins/enhanced-text-widgetAn enhanced version of the text widget that supports Text, HTML, CSS, JavaScript, Flash, Shortcodes and PHP with linkable widget title.
Is Enhanced Text Widget Safe to Use in 2026?
Generally Safe
Score 89/100Enhanced Text Widget has a strong security track record. Known vulnerabilities have been patched promptly.
The "enhanced-text-widget" plugin v1.6.7 presents a mixed security posture. While it demonstrates good practices in using prepared statements for SQL queries and implementing nonces and capability checks for its entry points, several concerning areas exist. The static analysis reveals a significant attack surface with 6 AJAX handlers, of which 2 lack proper authorization checks. This is a direct pathway for unauthenticated users to interact with potentially sensitive plugin functionality, increasing the risk of unauthorized actions. Additionally, the plugin uses the `unserialize` function, which is notoriously dangerous if not handled with extreme care to prevent object injection vulnerabilities. The output escaping is also a concern, with only 39% of outputs being properly escaped, indicating a moderate risk of Cross-Site Scripting (XSS) vulnerabilities.
The vulnerability history shows a pattern of 6 past medium-severity CVEs, predominantly related to XSS, Missing Authorization, and CSRF. While there are currently no unpatched vulnerabilities, this history suggests a recurring tendency for these types of security flaws to be present in the plugin's codebase. The recent vulnerability in April 2024 further emphasizes the need for ongoing vigilance. Overall, the plugin has strengths in its SQL handling and some security checks, but the unauthenticated AJAX handlers, risky `unserialize` usage, and poor output escaping, combined with its past vulnerability record, warrant a cautious approach.
Key Concerns
- Unprotected AJAX handlers
- Usage of unserialize()
- Low percentage of properly escaped output
- History of medium severity vulnerabilities
Enhanced Text Widget Security Vulnerabilities
CVEs by Year
Severity Breakdown
6 total CVEs
Inisev Analyst Module <= Various Versions - Missing Authorization
Enhanced Text Widget <= 1.6.5 - Authenticated (Administrator+) Stored Cross-Site Scripting
Enhanced Text Widget <= 1.6.3 - Missing Authorization via etw_hide_admin_notification_callback
Inisev Plugins (Various Versions) - Cross-Site Request Forgery on handle_installation function
Inisev Plugins (Various Versions) - Missing Authorization on handle_installation function
Enhanced Text Widget <= 1.5.8 - Missing Authorization
Enhanced Text Widget Code Analysis
Dangerous Functions Found
Output Escaping
Enhanced Text Widget Attack Surface
AJAX Handlers 6
WordPress Hooks 18
Maintenance & Trust
Enhanced Text Widget Maintenance & Trust
Maintenance Signals
Community Trust
Enhanced Text Widget Alternatives
Linkable Title Html and Php Widget
linkable-title-html-and-php-widget
A widget where you may have Text, HTML, Javascript, Flash and/or Php as content with linkable/clickable widget title.
Widget Context
widget-context
Show and hide widgets on specific posts, pages and sections of your site.
WP Editor Widget
wp-editor-widget
WP Editor Widget adds a rich text widget where the content is edited using the standard WordPress visual editor.
Widget Content Blocks
wysiwyg-widgets
Edit widget content using the default WordPress visual editor and media uploading functionality. Create widgets like you would create posts or pages.
Podium
podium
Add and customize Podium's Web Suite tools to your WordPress website
Enhanced Text Widget Developer Profile
2 plugins · 40K total installs
How We Detect Enhanced Text Widget
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
enhanced-text-widgetwidget_textid="enhanced-text-widget-admin-css"id="etw-credits-style-css"