Feature Status Check Security & Risk Analysis

wordpress.org/plugins/feature-status-check

Checks to see if the plugins and themes you have on your site are still supported in the WordPress directories.

0 active installs v1.4 PHP 7.0+ WP 5.2+ Updated Dec 3, 2023
admin-plugins-themes-status
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Feature Status Check Safe to Use in 2026?

Generally Safe

Score 85/100

Feature Status Check has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "feature-status-check" plugin v1.4 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and a lack of critical or high-severity findings in the vulnerability history are positive indicators. The code analysis also shows strengths, with all SQL queries using prepared statements and a complete lack of dangerous functions, file operations, and external HTTP requests that could pose direct security risks. This suggests a development team that is likely aware of common WordPress security pitfalls.

However, there are areas for improvement. A significant concern is the low percentage of properly escaped output (53%). This means that a substantial portion of the data displayed to users is not being sanitized, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully within these unescaped outputs. Additionally, the plugin lacks nonce and capability checks for all entry points analyzed. While the static analysis indicates a small attack surface with no unprotected entry points, the absence of these fundamental WordPress security mechanisms is a weakness that could be exploited if any entry points are inadvertently exposed or if future updates increase the attack surface without implementing these checks.

In conclusion, while the plugin has a strong foundation with no known vulnerabilities and secure handling of sensitive operations like SQL queries, the prevalent issue of unescaped output and the absence of nonce/capability checks on all entry points represent notable security risks. Addressing the output escaping and ensuring proper authorization checks on all interaction points are crucial for strengthening the plugin's overall security.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Feature Status Check Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Feature Status Check Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
35
40 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

53% escaped75 total outputs
Attack Surface

Feature Status Check Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menufeature-status-check.php:29
actionadmin_menufeature-status-check.php:32
actionadmin_enqueue_scriptsfeature-status-check.php:35
actionfsc_daily_eventfeature-status-check.php:38
filtersite_status_testsfeature-status-check.php:43
filtersite_health_navigation_tabsfeature-status-check.php:44
actionsite_health_tab_contentfeature-status-check.php:45

Scheduled Events 3

fsc_daily_event
fsc_daily_event
fsc_daily_event
Maintenance & Trust

Feature Status Check Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 3, 2023
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

Feature Status Check Alternatives

No alternatives data available yet.

Developer Profile

Feature Status Check Developer Profile

Greg Ross

34 plugins · 8K total installs

80
trust score
Avg Security Score
88/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect Feature Status Check

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/feature-status-check/css/fsc.css/wp-content/plugins/feature-status-check/css/jquery-ui-1.10.4.custom.css/wp-content/plugins/feature-status-check/css/jquery-ui-tabs.css/wp-content/plugins/feature-status-check/css/sortable-base.min.css
Script Paths
/wp-content/plugins/feature-status-check/js/sortable.js
Version Parameters
feature-status-check/css/fsc.css?ver=feature-status-check/css/jquery-ui-1.10.4.custom.css?ver=feature-status-check/css/jquery-ui-tabs.css?ver=feature-status-check/css/sortable-base.min.css?ver=feature-status-check/js/sortable.js?ver=

HTML / DOM Fingerprints

CSS Classes
fsc-wrapfsc-status-wrapfsc-plugin-status-container
Data Attributes
data-fsc-plugin-status
JS Globals
fsc_pretty_status
FAQ

Frequently Asked Questions about Feature Status Check