Extended Options Security & Risk Analysis

wordpress.org/plugins/extended-options

Extended Options keeps meta data and certain WordPress tweaks persistent regardless of the active theme without editing any theme files.

70 active installs v0.1.2 β PHP + WP 2.5+ Updated Nov 29, 2012
archive-metaatomdiscovery-metageneratorgeo-tags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Extended Options Safe to Use in 2026?

Generally Safe

Score 85/100

Extended Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "extended-options" plugin, version 0.1.2 β, presents a mixed security posture. On the positive side, the plugin has no known historical vulnerabilities and boasts a minimal attack surface with zero identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. It also includes nonce and capability checks, indicating an awareness of basic WordPress security practices. However, significant concerns arise from the static analysis of its code. The absence of prepared statements for all SQL queries, coupled with a complete lack of output escaping, creates a substantial risk for SQL injection and cross-site scripting (XSS) vulnerabilities. While no critical or high severity taint flows were detected, the presence of a flow with an unsanitized path suggests a potential for unintended data handling, even if its immediate impact is not critical. The lack of output escaping is particularly worrying, as it means any data processed by the plugin and then displayed to users could be manipulated by attackers.

In conclusion, while the plugin's limited attack surface and absence of historical CVEs are strengths, the critical flaws in its data handling (SQL and output) represent a serious security weakness. The plugin is currently in a beta state, which might explain some of these issues, but the lack of basic security measures like prepared statements and output escaping makes it a risky choice for production environments without significant code remediation. The potential for vulnerabilities, despite the current lack of recorded history, is high due to these fundamental coding deficiencies.

Key Concerns

  • SQL queries lack prepared statements
  • No output escaping
  • Flows with unsanitized paths
Vulnerabilities
None known

Extended Options Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Extended Options Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
117
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

0% escaped117 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<exops> (exops.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Extended Options Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
actionwp_headexops.php:129
actionwp_headexops.php:155
actionwp_headexops.php:175
actionadmin_headexops.php:199
actionwp_headexops.php:208
actionwp_headexops.php:224
actionwp_headexops.php:240
actionwp_headexops.php:267
actionwp_headexops.php:301
actionadmin_headexops.php:319
actionlogin_headexops.php:337
actionwpexops.php:354
actionwpexops.php:366
filterthe_generatorexops.php:405
actionwp_headexops.php:414
actioncomment_formexops.php:425
actionwp_footerexops.php:434
actionadmin_menuexops.php:536
Maintenance & Trust

Extended Options Maintenance & Trust

Maintenance Signals

WordPress version tested2.6.3
Last updatedNov 29, 2012
PHP min version
Downloads11K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

Extended Options Developer Profile

scottwallick

2 plugins · 270 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Extended Options

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
EXTENDED OPTIONS by SCOTT ALLAN WALLICK, http://scottwallick.com/ from PLAINTXT.ORG, http://www.plaintxt.org/ This file is part of EXTENDED OPTIONS. EXTENDED OPTIONS is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. EXTENDED OPTIONS is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for details. You should have received a copy of the GNU General Public License along with EXTENDED OPTIONS. If not, see www.gnu.org/licenses/.Our function to create relationship meta linksWe'll need post data outside of the loop.We can specify the TYPE attribute for the LINK, so let's+45 more
FAQ

Frequently Asked Questions about Extended Options