
Erudus One for WordPress Security & Risk Analysis
wordpress.org/plugins/erudus-oneDisplay Erudus product data inside of WordPress using the Erudus API.
Is Erudus One for WordPress Safe to Use in 2026?
Generally Safe
Score 85/100Erudus One for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'erudus-one' plugin version 1.0.0 exhibits a mixed security posture. On the positive side, it has a very limited attack surface, with only one shortcode identified and no AJAX handlers, REST API routes, or cron events detected. Furthermore, there are no known vulnerabilities or CVEs associated with this plugin, and the taint analysis did not reveal any critical or high severity issues. This suggests a potentially low risk of exploit for known attack vectors.
However, several significant concerns arise from the static code analysis. The presence of the `unserialize` function without any accompanying capability checks or nonce verification is a major red flag. This function is notoriously dangerous if used with untrusted input, potentially leading to remote code execution or denial-of-service vulnerabilities. Additionally, a very low percentage (11%) of output escaping indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of any capability checks for its entry points, even though the attack surface is small, is also concerning as it implies that any user, regardless of their role, could potentially interact with the plugin's functionalities in unintended ways.
While the vulnerability history is clean, this can be attributed to the limited scope of analysis and the plugin's infancy. The static code analysis reveals practices that are inherently risky and could be exploited if an attacker can find a way to inject data into the unserialization process or trigger an unescaped output. Therefore, despite the absence of known vulnerabilities, the plugin should be treated with caution due to these fundamental security weaknesses.
Key Concerns
- Dangerous function unserialize used
- Low output escaping percentage (11%)
- No capability checks on entry points
- No nonce checks on entry points
Erudus One for WordPress Security Vulnerabilities
Erudus One for WordPress Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Erudus One for WordPress Attack Surface
Shortcodes 1
WordPress Hooks 4
Maintenance & Trust
Erudus One for WordPress Maintenance & Trust
Maintenance Signals
Community Trust
Erudus One for WordPress Alternatives
NutritionWP
nutritionwp
Super easy recipe plugin with nutritional facts. Made by a foodie!
WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
delicious-recipes
WP Delicious is an SEO-optimized and Schema-friendly recipe plugin for food bloggers to create and display unlimited recipes.
Cooked – Recipe Management
cooked
Cooked is the absolute best way to create & display recipes with WordPress. SEO optimized, galleries, timers, and much more.
Nutrition Facts Vitamins
nutrition-facts-vitamins
Use this free WordPress plugin to create Nutrition Facts Labels with vitamins.
WP Nutrition Facts
wp-nutrition-facts
Insert a Nutrition Facts Table to pages, posts and custom post type.
Erudus One for WordPress Developer Profile
1 plugin · 20 total installs
How We Detect Erudus One for WordPress
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/erudus-one/public/css/style.css/wp-content/plugins/erudus-one/public/js/erudus-plugin-public.js/wp-content/plugins/erudus-one/public/js/erudus-plugin-public.jsver=1.0.0HTML / DOM Fingerprints
[erudus-product