Featured Image RSS Enclosure Security & Risk Analysis

wordpress.org/plugins/featured-image-rss-enclosure

Copyright 2017 by Tim McDaniels http://www.weareconvoy.com This program is free software; you can redistribute it and/or modify it under the terms of …

100 active installs v1.0 PHP + WP 4.6+ Updated Unknown
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Featured Image RSS Enclosure Safe to Use in 2026?

Generally Safe

Score 100/100

Featured Image RSS Enclosure has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "featured-image-rss-enclosure" plugin v1.0 exhibits a seemingly robust security posture based on the provided static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the complete reliance on prepared statements for SQL queries and the lack of file operations and external HTTP requests are excellent security practices.

However, a critical concern arises from the output escaping analysis, indicating that 100% of outputs are not properly escaped. This presents a significant risk for Cross-Site Scripting (XSS) vulnerabilities, where malicious code could be injected into the plugin's output and executed in a user's browser. The lack of nonce and capability checks, while less impactful given the limited attack surface, means that any future additions to these entry points might be immediately exploitable if not secured. The plugin's vulnerability history being entirely clear is positive, suggesting a history of secure development, but does not mitigate the immediate risk of unescaped output.

In conclusion, while the plugin avoids many common pitfalls by having a minimal attack surface and secure data handling for SQL, the pervasive issue of unescaped output is a serious weakness that needs immediate attention to prevent XSS attacks. The current score reflects the strengths in attack surface reduction and SQL safety but is significantly impacted by the critical flaw in output sanitization.

Key Concerns

  • 100% of outputs are not properly escaped
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

Featured Image RSS Enclosure Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Featured Image RSS Enclosure Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Featured Image RSS Enclosure Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionrss2_itemfeatured-image-rss-enclosure.php:46
actionrss_itemfeatured-image-rss-enclosure.php:47
Maintenance & Trust

Featured Image RSS Enclosure Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Alternatives

Featured Image RSS Enclosure Alternatives

No alternatives data available yet.

Developer Profile

Featured Image RSS Enclosure Developer Profile

timmcdaniels

2 plugins · 200 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Featured Image RSS Enclosure

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<enclosure url="" length="" type="" />
FAQ

Frequently Asked Questions about Featured Image RSS Enclosure