FnF.FM Radio Security & Risk Analysis

wordpress.org/plugins/fnffm-radio

FnF.FM is an Online Radio Station that can be used as either a widget or Short code.

30 active installs v1.1 PHP + WP 3.0+ Updated Aug 21, 2016
online-radioonline-radio-pluginradiosidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FnF.FM Radio Safe to Use in 2026?

Generally Safe

Score 85/100

FnF.FM Radio has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "fnffm-radio" plugin v1.1 exhibits a mixed security posture. On the positive side, it demonstrates good practices by exclusively using prepared statements for its SQL queries and has no recorded vulnerabilities or CVEs. The attack surface appears limited, with only one shortcode identified as an entry point, and no AJAX handlers or REST API routes were found without authentication checks. Furthermore, there are no file operations or external HTTP requests, which generally reduces the potential for certain types of attacks.

However, several significant concerns emerge from the static analysis. The use of the `create_function` is a critical security anti-pattern, as it can be exploited for code injection if any part of the dynamically created function's code is user-controlled. More alarmingly, a complete lack of output escaping across all identified outputs (6 in total) means that any dynamic content displayed by the plugin is highly susceptible to Cross-Site Scripting (XSS) attacks. The absence of nonce checks and capability checks on its limited entry points also presents a vulnerability, potentially allowing for unauthorized actions or information disclosure if exploited.

Given the absence of historical vulnerabilities, it's difficult to infer patterns beyond the current code. However, the presence of `create_function` and especially the widespread lack of output escaping are serious flaws that demand immediate attention. While the plugin's current lack of public CVEs is a positive indicator, the identified code-level weaknesses represent a substantial risk that could lead to critical security incidents like XSS and potential code execution.

Key Concerns

  • Use of dangerous function create_function
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

FnF.FM Radio Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FnF.FM Radio Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("fnffmradiowidget");') );fnf.fm.php:65

Output Escaping

0% escaped6 total outputs
Attack Surface

FnF.FM Radio Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[fnffm] fnf.fm.php:18
WordPress Hooks 2
filterwidget_textfnf.fm.php:19
actionwidgets_initfnf.fm.php:65
Maintenance & Trust

FnF.FM Radio Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 21, 2016
PHP min version
Downloads15K

Community Trust

Rating100/100
Number of ratings5
Active installs30
Developer Profile

FnF.FM Radio Developer Profile

Arifur Rahman

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FnF.FM Radio

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
fnffmradiowidget
Shortcode Output
<iframe height="430" scrolling="no" src="http://big.fnf.fm" width="100%"></iframe><iframe height="80" scrolling="no" src="http://big.fnf.fm" width="100%"></iframe>
FAQ

Frequently Asked Questions about FnF.FM Radio