
Extended Theme Option Security & Risk Analysis
wordpress.org/plugins/extended-theme-optionExtended Theme Option is an advanced plugin to add more fields in the site. Field values can be retrived by using auto generated functions.
Is Extended Theme Option Safe to Use in 2026?
Generally Safe
Score 85/100Extended Theme Option has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "extended-theme-option" plugin v1.0.1 exhibits a concerning security posture despite a clean vulnerability history. While the plugin has no known CVEs and a seemingly small attack surface (0 AJAX handlers, REST API routes, shortcodes, or cron events), the static analysis reveals significant weaknesses. A critical concern is the complete lack of output escaping (0% properly escaped), which makes any dynamic content rendered by the plugin highly susceptible to Cross-Site Scripting (XSS) attacks. The taint analysis further exacerbates this, showing 3 flows with unsanitized paths, all classified as high severity. This indicates that data processed by the plugin is not being adequately cleaned before being used, potentially leading to code injection or other malicious actions through these unsanitized flows.
The absence of nonces on AJAX handlers and the limited capability checks (only 1) suggest that even if an attack vector were found, user authentication and authorization might not be sufficiently enforced. The fact that 4 out of 9 SQL queries are not using prepared statements also introduces a risk of SQL injection vulnerabilities, although this is less severe than the XSS and taint flow issues. The lack of any recorded vulnerabilities in its history might lead to complacency, but the current static analysis findings present substantial risks that need immediate attention.
Key Concerns
- All output is unescaped (0%)
- 3 high severity taint flows with unsanitized paths
- 44% of SQL queries not using prepared statements
- 0 nonce checks on AJAX handlers
- Only 1 capability check found
Extended Theme Option Security Vulnerabilities
Extended Theme Option Release Timeline
Extended Theme Option Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Extended Theme Option Attack Surface
WordPress Hooks 4
Maintenance & Trust
Extended Theme Option Maintenance & Trust
Maintenance Signals
Community Trust
Extended Theme Option Alternatives
No alternatives data available yet.
Extended Theme Option Developer Profile
1 plugin · 10 total installs
How We Detect Extended Theme Option
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-extend-theme/css/wpeto-style.cssHTML / DOM Fingerprints
field_titleadmn_err_msgfooter_developer