Footnotation Security & Risk Analysis

wordpress.org/plugins/footnotation

An easy way to add footnotes to your posts.

100 active installs v1.2 PHP + WP 2.0+ Updated Apr 30, 2017
academicendnotesessayfootnotespost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Footnotation Safe to Use in 2026?

Generally Safe

Score 85/100

Footnotation has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The footnotation plugin version 1.2 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is highly commendable. Furthermore, the fact that all SQL queries utilize prepared statements and all identified outputs are properly escaped indicates a developer's commitment to secure coding practices. The presence of a nonce check is also a positive sign, although the lack of capability checks on any entry points is a minor concern given the lack of any exposed entry points in the first place.

The plugin's vulnerability history is completely clear, with no recorded CVEs of any severity. This, combined with the clean static analysis, suggests that the plugin is currently very secure and has likely maintained a good security record throughout its development. The complete lack of any identified taint flows further reinforces the confidence in the plugin's current security state.

In conclusion, footnotation v1.2 appears to be a robustly secured plugin. Its strengths lie in its clean code, absence of common vulnerabilities, and excellent vulnerability history. The only potential area for minor improvement would be the explicit implementation of capability checks on entry points, though the current lack of exposed entry points mitigates this risk significantly. Overall, this plugin presents a very low security risk.

Vulnerabilities
None known

Footnotation Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Footnotation Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Footnotation Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menufootnotation.php:35
actionwp_enqueue_scriptsfootnotation.php:36
actionwp_enqueue_scriptsfootnotation.php:37
actionthe_contentfootnotation.php:235
Maintenance & Trust

Footnotation Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedApr 30, 2017
PHP min version
Downloads5K

Community Trust

Rating96/100
Number of ratings5
Active installs100
Developer Profile

Footnotation Developer Profile

vhbelvadi

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Footnotation

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/footnotation/footnotation-styles.css/wp-content/plugins/footnotation/footnotation.js
Script Paths
/wp-content/plugins/footnotation/footnotation.js
Version Parameters
footnotation/footnotation.js?ver=1.34

HTML / DOM Fingerprints

CSS Classes
footnotefootnoteblack
HTML Comments
Workaround for wpautop() bug. Otherwise it sometimes inserts an opening <p> but not the closing </p>. From fd-footnotes*************************************
Data Attributes
id="footnotation-conf"name="footnotation_single"name="footnotation_collapse"name="footnotation_colour"id="markerref-onclick="return footnotation_show(
JS Globals
footnotation_show
Shortcode Output
<sup class='footnote footnoteblack'><a href='#marker-<sup class='footnote'><a href='#marker-
FAQ

Frequently Asked Questions about Footnotation