Fetch URL – Fetch and Parse External Content Security & Risk Analysis

wordpress.org/plugins/fetchurl

Use the remote_get and preg_replace shortcodes to fetch external content and parse it to use on your page or post.

10 active installs v3.04.26 PHP + WP 2.7+ Updated Dec 30, 2013
curlpreg_replaceshortcodewp_remote_get
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Fetch URL – Fetch and Parse External Content Safe to Use in 2026?

Generally Safe

Score 85/100

Fetch URL – Fetch and Parse External Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'fetchurl' plugin v3.04.26 exhibits a generally strong security posture based on the provided static analysis. The absence of AJAX handlers and REST API routes without authentication checks, along with the exclusive use of prepared statements for SQL queries, are positive indicators. The plugin also has no recorded vulnerability history, suggesting a history of secure development or effective patching. However, there are significant concerns regarding output escaping and the lack of capability checks and nonce checks.

The primary areas of concern are the 100% of outputs not being properly escaped, which can lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is directly echoed to the browser. Additionally, the absence of nonce checks on its entry points (shortcodes in this case) leaves it vulnerable to Cross-Site Request Forgery (CSRF) attacks, as actions initiated by these shortcodes could be triggered by malicious actors without the user's explicit consent. The presence of file operations and external HTTP requests also warrants careful scrutiny, although without taint analysis, the specific risks are unclear.

In conclusion, while the plugin avoids common pitfalls like SQL injection and has a clean vulnerability record, the unescaped output and lack of nonces represent critical security weaknesses that attackers could exploit. Developers should prioritize addressing these issues to mitigate the risk of XSS and CSRF attacks.

Key Concerns

  • All outputs unescaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Fetch URL – Fetch and Parse External Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Fetch URL – Fetch and Parse External Content Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Fetch URL – Fetch and Parse External Content Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[preg_replace] index.php:65
[preg_replace_shortcode] index.php:79
[str_replace] index.php:86
[remote_get] index.php:143
WordPress Hooks 2
actionadmin_noticesindex.php:44
filterplugin_row_metaindex.php:60
Maintenance & Trust

Fetch URL – Fetch and Parse External Content Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 30, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Fetch URL – Fetch and Parse External Content Developer Profile

Ovidiu Purdea

4 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fetch URL – Fetch and Parse External Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!-- FETCHURL cached(.*?)--><!-- FETCHURL body_length(.*?)-->
Shortcode Output
<!-- FETCHURL cachedFETCHURL ERROR:FETCHURL ERROR: wp_remote_getFETCHURL start=
FAQ

Frequently Asked Questions about Fetch URL – Fetch and Parse External Content