EP Admin Messages Security & Risk Analysis

wordpress.org/plugins/ep-admin-messages

Show messages in WP Admin. Different messages can be shown at different places, for different people.

10 active installs v0.1.6 PHP + WP 3.6+ Updated Nov 5, 2013
adminmessagesnoticeswordpress-adminwp-admin
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EP Admin Messages Safe to Use in 2026?

Generally Safe

Score 85/100

EP Admin Messages has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'ep-admin-messages' plugin version 0.1.6 exhibits a generally strong security posture based on the static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant positive. Furthermore, the fact that all SQL queries utilize prepared statements demonstrates good practice in preventing SQL injection. The plugin also has no recorded vulnerability history, indicating a stable and likely well-maintained codebase.

However, there are notable areas of concern. The most significant is the complete lack of output escaping for all identified outputs. This presents a high risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected and executed in the user's browser. While the attack surface is zero, the lack of output escaping on existing outputs is a critical oversight. The presence of file operations without clear context also warrants caution, though without specific taint flows, their immediate risk is difficult to quantify.

In conclusion, while the plugin benefits from a minimal attack surface and secure database interaction practices, the critical deficiency in output escaping poses a substantial risk. The lack of historical vulnerabilities is reassuring, but it does not mitigate the immediate threat of XSS due to the identified unescaped outputs. Addressing the output escaping issue should be the top priority for improving the plugin's security.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

EP Admin Messages Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

EP Admin Messages Release Timeline

v0.1.6Current
v0.1.4
v0.1.3
Code Analysis
Analyzed Apr 16, 2026

EP Admin Messages Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

EP Admin Messages Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actioninitep-admin-messages.class.php:14
actioncurrent_screenep-admin-messages.class.php:23
actionadmin_noticesep-admin-messages.class.php:298
actionadmin_noticesep-admin-messages.class.php:374
actionadmin_noticesep-admin-messages.class.php:380
Maintenance & Trust

EP Admin Messages Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedNov 5, 2013
PHP min version
Downloads3K

Community Trust

Rating66/100
Number of ratings3
Active installs10
Developer Profile

EP Admin Messages Developer Profile

Pär Thernström

12 plugins · 361K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
1498 days
View full developer profile
Detection Fingerprints

How We Detect EP Admin Messages

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ep-admin-messages/css/ep-admin-messages.css/wp-content/plugins/ep-admin-messages/js/ep-admin-messages.js
Script Paths
/wp-content/plugins/ep-admin-messages/js/ep-admin-messages.js
Version Parameters
ep-admin-messages/css/ep-admin-messages.css?ver=ep-admin-messages/js/ep-admin-messages.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about EP Admin Messages