Footer Code Security & Risk Analysis

wordpress.org/plugins/footer-code

Simplest plugin that injects any code into footer of a web page.

30 active installs v1.3 PHP + WP 4.0+ Updated Sep 26, 2024
analyticscodefooterinjectwp_footer
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Footer Code Safe to Use in 2026?

Generally Safe

Score 92/100

Footer Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "footer-code" v1.3 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, file operations, external HTTP requests, and the use of prepared statements for all SQL queries are commendable practices. Furthermore, the plugin's attack surface appears to be minimal, with no AJAX handlers, REST API routes, shortcodes, or cron events, significantly reducing potential entry points for attackers. The lack of recorded vulnerabilities in its history is also a positive indicator of its security maturity.

However, there are areas for improvement. The output escaping is only properly handled for one-third of the identified outputs, which presents a potential risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is directly rendered without proper sanitization. Additionally, the complete absence of nonce and capability checks, while not directly tied to the current attack surface, suggests a potential gap in security best practices that could become a concern if the plugin's functionality were to expand or if new entry points were introduced in future versions. Overall, while the plugin is currently robust and has a clean vulnerability history, the unescaped output warrants attention to maintain a high level of security.

Key Concerns

  • Output escaping is only properly handled for 33% of outputs
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Footer Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Footer Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Footer Code Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_footerfooter-code.php:20
actioninitoptions.php:12
actionadmin_menuoptions.php:13
actionadmin_initoptions.php:14
Maintenance & Trust

Footer Code Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedSep 26, 2024
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Footer Code Developer Profile

Gaiaz Iusipov

4 plugins · 560 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Footer Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Footer Code