Kalendář CZ Security & Risk Analysis

wordpress.org/plugins/feed-back

CZ: Plugin zajišťující zpětnou vazbu.

10 active installs v1.0 PHP + WP 2.5+ Updated Aug 14, 2014
feedback
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kalendář CZ Safe to Use in 2026?

Generally Safe

Score 85/100

Kalendář CZ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'feed-back' plugin version 1.0 presents a mixed security profile. On the positive side, it demonstrates good practices by avoiding dangerous functions, performing all SQL queries using prepared statements, and having no known vulnerabilities recorded in its history. The absence of external HTTP requests and file operations further contributes to a generally robust foundation.

However, there are significant concerns regarding output escaping. With 100% of outputs unescaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that originates from the plugin, if not properly sanitized, could be exploited to inject malicious scripts. Additionally, the lack of nonce and capability checks on the single identified shortcode, while not explicitly flagged as unprotected due to the count of entry points, means that interactions initiated by this shortcode may not be adequately secured against unauthorized actions or CSRF attacks. The zero taint analysis flows could be a positive sign of secure coding or an indication that the analysis depth was limited. Given the significant unescaped output issue, the overall security posture is concerning despite other positive aspects.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL, the critical flaw of unescaped output necessitates immediate attention. The potential for XSS, coupled with the unverified security of the shortcode's operations, outweighs the strengths. It is recommended to address the output escaping and review the security of shortcode interactions before deploying this plugin in a production environment.

Key Concerns

  • All outputs are unescaped
  • No nonce checks on shortcode
  • No capability checks on shortcode
Vulnerabilities
None known

Kalendář CZ Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Kalendář CZ Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Kalendář CZ Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

Kalendář CZ Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[feed_back] feed_back.php:73
WordPress Hooks 3
actionactivate_feed-back/feed_back.phpfeed_back.php:17
actiondeactivate_feed-back/feed_back.phpfeed_back.php:25
actionadmin_menufeed_back.php:88
Maintenance & Trust

Kalendář CZ Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedAug 14, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Kalendář CZ Developer Profile

Webster.K

3 plugins · 220 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Kalendář CZ

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/feed-back/feed_back_style.css

HTML / DOM Fingerprints

Data Attributes
style="border:1px solid black; border-radius: 10px;background-color:#38ed00;padding: 0px 10px 5px 10px;"style="margin-left:1px;border:1px solid black; border-radius: 10px;background-color:#FFFFFF; padding:1px 7px 1px 7px;"
Shortcode Output
<fieldset<legend
FAQ

Frequently Asked Questions about Kalendář CZ