Eyes Only Security & Risk Analysis

wordpress.org/plugins/eyes-only-plus

The ultimate tool for publishing your private thoughts in public

60 active installs v1.0.9 PHP + WP 5.4+ Updated Jul 15, 2024
anonymoushideprivacyprivateredaction
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Eyes Only Safe to Use in 2026?

Generally Safe

Score 92/100

Eyes Only has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'eyes-only-plus' plugin version 1.0.9 exhibits a generally good security posture, particularly concerning its handling of SQL queries and the absence of critical taint flows. The fact that all SQL queries utilize prepared statements is a significant strength, mitigating a common source of vulnerabilities. The plugin also shows positive signs with the presence of a nonce check and a file operation that is likely controlled within the plugin's logic.

However, there are areas that warrant attention. The relatively low percentage of properly escaped output (44%) suggests a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly rendered without adequate sanitization. The absence of capability checks on the single shortcode is also a concern, as it implies that any user, regardless of their role, could potentially execute the shortcode's functionality. While there are no recorded vulnerabilities or critical taint flows, the identified code signals indicate potential weaknesses that could be exploited if not addressed.

In conclusion, 'eyes-only-plus' v1.0.9 has a solid foundation with secure SQL practices and no known historical vulnerabilities. Nevertheless, the lack of capability checks on the shortcode and the significant proportion of unescaped output represent the most immediate risks. Addressing these specific areas would greatly enhance the plugin's overall security.

Key Concerns

  • Low percentage of properly escaped output
  • Shortcode without capability checks
Vulnerabilities
None known

Eyes Only Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Eyes Only Release Timeline

v1.0.9Current
v1.0
Code Analysis
Analyzed Mar 16, 2026

Eyes Only Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
14
11 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped25 total outputs
Attack Surface

Eyes Only Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[redact] model.php:134
WordPress Hooks 7
actionadmin_menumodel.php:82
actionadmin_enqueue_scriptsmodel.php:83
actionadmin_enqueue_scriptsmodel.php:88
filtermce_buttonsmodel.php:90
filtermce_external_pluginsmodel.php:91
filterthe_contentmodel.php:98
actionwp_headmodel.php:101
Maintenance & Trust

Eyes Only Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedJul 15, 2024
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

Eyes Only Developer Profile

Archetyped

4 plugins · 150K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
24 days
View full developer profile
Detection Fingerprints

How We Detect Eyes Only

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eyes-only-plus/css/style.css
Script Paths
/wp-content/plugins/eyes-only-plus/js/eop.js/wp-content/plugins/eyes-only-plus/js/admin.js

HTML / DOM Fingerprints

CSS Classes
redacted
JS Globals
eyes_only_prefix
Shortcode Output
[redact]
FAQ

Frequently Asked Questions about Eyes Only