
Extended Options Security & Risk Analysis
wordpress.org/plugins/extended-optionsExtended Options keeps meta data and certain WordPress tweaks persistent regardless of the active theme without editing any theme files.
Is Extended Options Safe to Use in 2026?
Generally Safe
Score 85/100Extended Options has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "extended-options" plugin, version 0.1.2 β, presents a mixed security posture. On the positive side, the plugin has no known historical vulnerabilities and boasts a minimal attack surface with zero identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected. It also includes nonce and capability checks, indicating an awareness of basic WordPress security practices. However, significant concerns arise from the static analysis of its code. The absence of prepared statements for all SQL queries, coupled with a complete lack of output escaping, creates a substantial risk for SQL injection and cross-site scripting (XSS) vulnerabilities. While no critical or high severity taint flows were detected, the presence of a flow with an unsanitized path suggests a potential for unintended data handling, even if its immediate impact is not critical. The lack of output escaping is particularly worrying, as it means any data processed by the plugin and then displayed to users could be manipulated by attackers.
In conclusion, while the plugin's limited attack surface and absence of historical CVEs are strengths, the critical flaws in its data handling (SQL and output) represent a serious security weakness. The plugin is currently in a beta state, which might explain some of these issues, but the lack of basic security measures like prepared statements and output escaping makes it a risky choice for production environments without significant code remediation. The potential for vulnerabilities, despite the current lack of recorded history, is high due to these fundamental coding deficiencies.
Key Concerns
- SQL queries lack prepared statements
- No output escaping
- Flows with unsanitized paths
Extended Options Security Vulnerabilities
Extended Options Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Extended Options Attack Surface
WordPress Hooks 18
Maintenance & Trust
Extended Options Maintenance & Trust
Maintenance Signals
Community Trust
Extended Options Alternatives
WP Sitemap Page
wp-sitemap-page
Add a sitemap on any of your page using the simple shortcode [wp_sitemap_page]. Improve the SEO and navigation of your website.
MaxButtons – Create buttons
maxbuttons
Maxbuttons is the best and easiest button plugin for WordPress. Within minutes you can create beautiful buttons, share buttons and social icons.
Connect Matomo – Analytics Dashboard for WordPress
wp-piwik
Adds Matomo (former Piwik) statistics to your WordPress dashboard and is also able to add the Matomo Tracking Code to your blog.
Disable Feeds
disable-feeds
Disables all RSS/Atom/RDF feeds on your WordPress site.
Simply Static – The Static Site Generator
simply-static
Convert WordPress to static HTML. Boost performance 3-5x. Eliminate security vulnerabilities. Deploy anywhere.
Extended Options Developer Profile
2 plugins · 270 total installs
How We Detect Extended Options
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
EXTENDED OPTIONS
by SCOTT ALLAN WALLICK, http://scottwallick.com/
from PLAINTXT.ORG, http://www.plaintxt.org/
This file is part of EXTENDED OPTIONS.
EXTENDED OPTIONS is free software: you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation, either version 3 of
the License, or (at your option) any later version.
EXTENDED OPTIONS is distributed in the hope that it will be
useful, but WITHOUT ANY WARRANTY; without even the implied
warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU General Public License for details.
You should have received a copy of the GNU General Public License
along with EXTENDED OPTIONS. If not, see www.gnu.org/licenses/.Our function to create relationship meta linksWe'll need post data outside of the loop.We can specify the TYPE attribute for the LINK, so let's+45 more