Field Name in Pods Editor Security & Risk Analysis

wordpress.org/plugins/field-name-in-pods-editor

This plugin enhances the Pods plugin by displaying the field names of pod fields below their labels when editing a pod.

0 active installs v1.0.0 PHP + WP + Updated Feb 25, 2025
custom-fieldscustom-post-typespods
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Field Name in Pods Editor Safe to Use in 2026?

Generally Safe

Score 92/100

Field Name in Pods Editor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "field-name-in-pods-editor" plugin version 1.0.0 exhibits a strong security posture. The absence of any detected dangerous functions, unsanitized taint flows, raw SQL queries, file operations, or external HTTP requests is highly commendable. Furthermore, the fact that all (zero) identified outputs are properly escaped and there are no known CVEs associated with this plugin indicates a responsible development approach.

However, the static analysis report reveals a complete lack of security checks for all identified entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. While the current attack surface is reported as zero, this implies that any future additions to these areas would be entirely unprotected. The absence of any recorded vulnerabilities is a positive indicator, suggesting diligent development and testing up to this version, but the complete lack of any security checks across potential entry points presents a concerning gap should the plugin evolve or new features be added.

In conclusion, the plugin demonstrates excellent secure coding practices in the areas it currently covers. The absence of critical vulnerabilities and adherence to prepared statements and output escaping are significant strengths. The primary weakness lies in the complete absence of any authentication or capability checks on potential entry points, which, while currently minimal, could pose a significant risk if the plugin's functionality or attack surface expands in the future without corresponding security measures.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Field Name in Pods Editor Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Field Name in Pods Editor Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Field Name in Pods Editor Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Field Name in Pods Editor Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_enqueue_scriptsfield-name-in-pods-editor.php:16
Maintenance & Trust

Field Name in Pods Editor Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 25, 2025
PHP min version
Downloads541

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Field Name in Pods Editor Developer Profile

johanvandemerwe

5 plugins · 340 total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Field Name in Pods Editor

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/field-name-in-pods-editor/assets/admin.js/wp-content/plugins/field-name-in-pods-editor/assets/admin.css
Script Paths
/wp-content/plugins/field-name-in-pods-editor/assets/admin.js
Version Parameters
field-name-in-pods-editor/assets/admin.js?ver=field-name-in-pods-editor/assets/admin.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Field Name in Pods Editor