Featured Favicons Security & Risk Analysis

wordpress.org/plugins/featured-favicons

A plugin that uses the featured image in your posts as a favicon for

40 active installs v1.2 PHP + WP 2.7+ Updated Jan 19, 2022
faviconfeatured-imageicon
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Featured Favicons Safe to Use in 2026?

Generally Safe

Score 85/100

Featured Favicons has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "featured-favicons" plugin v1.2 exhibits a generally strong security posture based on the provided static analysis. It has zero known vulnerabilities, a clean vulnerability history, and no reported CVEs, indicating a history of responsible development and maintenance. The code analysis reveals a remarkably small attack surface with no AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests suggests a limited scope of functionality that inherently reduces potential risk. The plugin also exclusively uses prepared statements for its SQL queries, which is a critical security best practice for preventing SQL injection vulnerabilities.

However, there is a significant concern regarding output escaping. The static analysis indicates that 100% of the four identified outputs are not properly escaped. This is a serious weakness that could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly reflected in the output without sanitization. While the taint analysis shows no identified unsanitized flows, this is likely due to the lack of identified input sources being analyzed in conjunction with the output points. The complete absence of nonce and capability checks across all entry points (though the attack surface is zero) also means that if any entry points were ever introduced, they would be unprotected. The plugin's strengths lie in its limited functionality and secure SQL practices, but the unescaped output is a critical vulnerability that needs immediate attention.

Key Concerns

  • All identified outputs are unescaped
Vulnerabilities
None known

Featured Favicons Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Featured Favicons Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Featured Favicons Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filterload_textdomain_mofilefeatured-favicons.php:32
actioninitfeatured-favicons.php:35
actionadmin_menufeatured-favicons.php:36
actionplugins_loadedfeatured-favicons.php:38
actionwp_headfeatured-favicons.php:44
filterget_post_metadatafeatured-favicons.php:47
filterplugin_action_links_featured-favicons/featured-favicons.phpfeatured-favicons.php:126
Maintenance & Trust

Featured Favicons Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJan 19, 2022
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Featured Favicons Developer Profile

Claude Vedovini

3 plugins · 440 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Featured Favicons

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
wp.media.frames.file_frame
FAQ

Frequently Asked Questions about Featured Favicons