
Feature Status Check Security & Risk Analysis
wordpress.org/plugins/feature-status-checkChecks to see if the plugins and themes you have on your site are still supported in the WordPress directories.
Is Feature Status Check Safe to Use in 2026?
Generally Safe
Score 85/100Feature Status Check has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "feature-status-check" plugin v1.4 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and a lack of critical or high-severity findings in the vulnerability history are positive indicators. The code analysis also shows strengths, with all SQL queries using prepared statements and a complete lack of dangerous functions, file operations, and external HTTP requests that could pose direct security risks. This suggests a development team that is likely aware of common WordPress security pitfalls.
However, there are areas for improvement. A significant concern is the low percentage of properly escaped output (53%). This means that a substantial portion of the data displayed to users is not being sanitized, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully within these unescaped outputs. Additionally, the plugin lacks nonce and capability checks for all entry points analyzed. While the static analysis indicates a small attack surface with no unprotected entry points, the absence of these fundamental WordPress security mechanisms is a weakness that could be exploited if any entry points are inadvertently exposed or if future updates increase the attack surface without implementing these checks.
In conclusion, while the plugin has a strong foundation with no known vulnerabilities and secure handling of sensitive operations like SQL queries, the prevalent issue of unescaped output and the absence of nonce/capability checks on all entry points represent notable security risks. Addressing the output escaping and ensuring proper authorization checks on all interaction points are crucial for strengthening the plugin's overall security.
Key Concerns
- Low percentage of properly escaped output
- No nonce checks on entry points
- No capability checks on entry points
Feature Status Check Security Vulnerabilities
Feature Status Check Code Analysis
Output Escaping
Feature Status Check Attack Surface
WordPress Hooks 7
Scheduled Events 3
Maintenance & Trust
Feature Status Check Maintenance & Trust
Maintenance Signals
Community Trust
Feature Status Check Alternatives
No alternatives data available yet.
Feature Status Check Developer Profile
34 plugins · 8K total installs
How We Detect Feature Status Check
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/feature-status-check/css/fsc.css/wp-content/plugins/feature-status-check/css/jquery-ui-1.10.4.custom.css/wp-content/plugins/feature-status-check/css/jquery-ui-tabs.css/wp-content/plugins/feature-status-check/css/sortable-base.min.css/wp-content/plugins/feature-status-check/js/sortable.jsfeature-status-check/css/fsc.css?ver=feature-status-check/css/jquery-ui-1.10.4.custom.css?ver=feature-status-check/css/jquery-ui-tabs.css?ver=feature-status-check/css/sortable-base.min.css?ver=feature-status-check/js/sortable.js?ver=HTML / DOM Fingerprints
fsc-wrapfsc-status-wrapfsc-plugin-status-containerdata-fsc-plugin-statusfsc_pretty_status