Fae Herald Security & Risk Analysis

wordpress.org/plugins/fae-herald

Keep your WordPress site secure by monitoring plugin releases and spotting closed plugins.

0 active installs v1.1.0 PHP 7.4+ WP 5.3+ Updated Unknown
maintenancemonitoringsecuritystatus
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fae Herald Safe to Use in 2026?

Generally Safe

Score 100/100

Fae Herald has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "fae-herald" plugin v1.1.0 exhibits a generally good security posture with several positive indicators. The complete absence of known CVEs and a strong adherence to using prepared statements for SQL queries are commendable. Furthermore, the plugin demonstrates a decent level of output escaping, with 70% of outputs being properly handled, and includes a reasonable number of nonce and capability checks. The static analysis also reveals no critical or high-severity taint flows, which is a significant positive sign.

However, a notable concern arises from the plugin's attack surface. With a total of one entry point, and that single point being an unprotected AJAX handler, this presents a significant security risk. Unprotected AJAX endpoints are prime targets for various attacks, including unauthorized actions, data leakage, or even Cross-Site Request Forgery (CSRF) if not properly mitigated by the application logic itself. While there are no direct SQL injection vulnerabilities due to prepared statements, and no critical taint flows detected, this single unprotected AJAX handler represents a direct and actionable vulnerability.

In conclusion, while the plugin's internal code hygiene is quite strong, with no historical vulnerabilities and good practices in SQL and output handling, the presence of an unprotected AJAX endpoint is a critical weakness that needs immediate attention. This single vulnerability overshadows the otherwise positive security attributes, indicating that while development practices are sound, security hardening of the external interface has been overlooked in this specific instance.

Key Concerns

  • Unprotected AJAX handler present
  • Output escaping not fully implemented (30% unescaped)
Vulnerabilities
None known

Fae Herald Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Fae Herald Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
43 escaped
Nonce Checks
3
Capability Checks
2
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

70% escaped61 total outputs
Attack Surface
1 unprotected

Fae Herald Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_fae_herald_save_screen_optionsincludes\class-fae-herald.php:122
WordPress Hooks 18
actionplugins_loadedfae-herald.php:41
actionfae_herald_get_infoincludes\class-fae-herald.php:96
actionfae_herald_check_singleincludes\class-fae-herald.php:97
actionafter_plugin_rowincludes\class-fae-herald.php:102
actionafter_plugin_row_metaincludes\class-fae-herald.php:104
actionadmin_enqueue_scriptsincludes\class-fae-herald.php:108
actionadmin_noticesincludes\class-fae-herald.php:111
actionadmin_noticesincludes\class-fae-herald.php:112
actiondeleted_pluginincludes\class-fae-herald.php:115
actionupgrader_process_completeincludes\class-fae-herald.php:116
actionactivated_pluginincludes\class-fae-herald.php:117
actiondeactivated_pluginincludes\class-fae-herald.php:118
filterscreen_settingsincludes\class-fae-herald.php:121
filterplugin_action_linksincludes\class-fae-herald.php:125
filternetwork_admin_plugin_action_linksincludes\class-fae-herald.php:127
actionnetwork_admin_menuincludes\class-fae-herald.php:128
actionadmin_initincludes\class-fae-herald.php:130
actionwp_dashboard_setupincludes\class-fae-herald.php:133

Scheduled Events 6

fae_herald_get_info
fae_herald_get_info
fae_herald_check_single
fae_herald_get_info
fae_herald_check_single
fae_herald_check_single
Maintenance & Trust

Fae Herald Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads156

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Fae Herald Developer Profile

Frederik Rosendahl-Kaa

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fae Herald

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fae-herald/assets/css/fae-herald-admin.css/wp-content/plugins/fae-herald/assets/js/fae-herald-admin.js
Script Paths
/wp-content/plugins/fae-herald/assets/js/fae-herald-admin.js
Version Parameters
fae-herald-admin-cssver=fae-herald-admin-jsver=

HTML / DOM Fingerprints

CSS Classes
fae-herald-plugin-status
Data Attributes
data-fae-herald-plugin-slugdata-fae-herald-action-url
JS Globals
faeHeraldAdminfaeHeraldL10n
FAQ

Frequently Asked Questions about Fae Herald