Footnotes for WordPress Security & Risk Analysis

wordpress.org/plugins/footnotes-for-wordpress

Footnotes for WordPress enables easy-to-use fancy footnotes for WordPress posts.

100 active installs v2016.1230 PHP + WP 2.9+ Updated Dec 30, 2016
footnotesformatting
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 1, 2025
Safety Verdict

Is Footnotes for WordPress Safe to Use in 2026?

Use With Caution

Score 64/100

Footnotes for WordPress has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 1, 2025Updated 9yr ago
Risk Assessment

The "footnotes-for-wordpress" plugin version 2016.1230 presents a mixed security posture. On the positive side, the plugin exhibits strong practices regarding database interactions, with 100% of SQL queries utilizing prepared statements and no direct file operations or external HTTP requests detected. The static analysis also shows a limited attack surface with no identified AJAX handlers or REST API routes exposed without authentication. However, significant concerns arise from the lack of comprehensive output escaping, with only 29% of outputs properly escaped, indicating a strong potential for Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the absence of any nonce checks or capability checks across its entry points (shortcodes) is a critical oversight, leaving it susceptible to various attacks if input is not properly sanitized.

The vulnerability history is particularly concerning. The plugin has a known critical vulnerability history, specifically a medium severity Cross-Site Scripting (XSS) flaw, which remains unpatched according to the provided data. The fact that the last vulnerability was documented as recent (2025-04-01) and is still unaddressed suggests a lack of active maintenance and a high likelihood of existing exploitable weaknesses. While taint analysis shows no immediate critical or high severity flows, this is likely due to the static analysis being limited or the identified vulnerabilities not triggering the taint analysis rules. The combination of these factors, especially the unpatched XSS vulnerability and lack of robust input/output sanitization on shortcodes, creates a significant risk.

In conclusion, despite some good practices in areas like SQL handling, the "footnotes-for-wordpress" plugin version 2016.1230 is a high-risk component. The presence of an unpatched XSS vulnerability, coupled with insufficient output escaping and a complete lack of nonce and capability checks on its entry points, makes it a prime target for attackers. Users should exercise extreme caution and prioritize updating or replacing this plugin.

Key Concerns

  • Unpatched CVE (Medium Severity XSS)
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
1

Footnotes for WordPress Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-31735medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Footnotes for WordPress <= 2016.1230 - Authenticated (Contributor+) Stored Cross-Site Scripting

Apr 1, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Footnotes for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

Footnotes for WordPress Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[ref] wp-footnotes.php:44
[backref] wp-footnotes.php:45
[references] wp-footnotes.php:46
WordPress Hooks 3
filterthe_contentwp-footnotes.php:49
actioninitwp-footnotes.php:51
actionwp_headwp-footnotes.php:52
Maintenance & Trust

Footnotes for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 30, 2016
PHP min version
Downloads10K

Community Trust

Rating80/100
Number of ratings1
Active installs100
Developer Profile

Footnotes for WordPress Developer Profile

C. Johnson

2 plugins · 10K total installs

66
trust score
Avg Security Score
81/100
Avg Patch Time
2085 days
View full developer profile
Detection Fingerprints

How We Detect Footnotes for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/footnotes-for-wordpress/footnote-voodoo.css/wp-content/plugins/footnotes-for-wordpress/footnote-voodoo.js/wp-content/plugins/footnotes-for-wordpress/footnoted.png/wp-content/plugins/footnotes-for-wordpress/note.png/wp-content/plugins/footnotes-for-wordpress/tip.png/wp-content/plugins/footnotes-for-wordpress/tip-down.png
Script Paths
/wp-content/plugins/footnotes-for-wordpress/footnote-voodoo.js
Version Parameters
footnotes-for-wordpress/footnote-voodoo.css?ver=2016.1230footnotes-for-wordpress/footnote-voodoo.js?ver=2016.1230

HTML / DOM Fingerprints

CSS Classes
footnotenote-returnfootnoted
Data Attributes
data-backlink-prefix
JS Globals
tipUpUrltipDownUrl
Shortcode Output
<ol class="footnotes"><li class="footnote"><a class="note-return" href="#<sup>[
FAQ

Frequently Asked Questions about Footnotes for WordPress