
Footnotes Made Easy Security & Risk Analysis
wordpress.org/plugins/footnotes-made-easyAllows post authors to easily add and manage footnotes in posts.
Is Footnotes Made Easy Safe to Use in 2026?
Generally Safe
Score 97/100Footnotes Made Easy has a strong security track record. Known vulnerabilities have been patched promptly.
The static analysis of "footnotes-made-easy" v3.1.0 reveals an excellent security posture regarding its current code. The absence of any identified dangerous functions, file operations, or external HTTP requests is a significant strength. Furthermore, the complete use of prepared statements for SQL queries, 100% proper output escaping, and the presence of nonce checks and capability checks indicate strong defensive programming practices. The total entry points are zero, meaning there are no publicly exposed interfaces for direct exploitation through AJAX, REST API, shortcodes, or cron events in the analyzed version.
However, the vulnerability history presents a concern. A known high-severity vulnerability exists, although it is currently marked as unpatched in the provided history. This indicates a past weakness that, while potentially addressed in later versions or a separate patch, is a critical point of attention for this specific version (v3.1.0). The common vulnerability type being Cross-site Scripting (XSS) is particularly relevant as it often exploits unescaped output or improper input handling, which is contrary to the current static analysis findings. This suggests that the specific vulnerability might have been in a different version or a historical issue that has been remediated. The last vulnerability timestamp is in the future (2025-11-03), which is likely an data anomaly and should be disregarded when assessing current risk based on the "currently unpatched: 0" status.
In conclusion, while the current codebase of "footnotes-made-easy" v3.1.0 appears highly secure based on static analysis, the historical presence of a high-severity XSS vulnerability, even if marked as unpatched in the past, necessitates caution. The excellent coding practices observed in the static analysis are commendable, but users should verify that the specific version they are using has definitively addressed any historical security flaws to maintain a robust security posture.
Key Concerns
- High severity vulnerability history
Footnotes Made Easy Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Footnotes Made Easy <= 3.0.7 - Unauthenticated Stored Cross-Site Scripting
Footnotes Made Easy Code Analysis
Output Escaping
Footnotes Made Easy Attack Surface
WordPress Hooks 10
Maintenance & Trust
Footnotes Made Easy Maintenance & Trust
Maintenance Signals
Community Trust
Footnotes Made Easy Alternatives
Blank Footnotes
blank-footnotes
Simple plugin to show footnotes using markdown notation.
Footnotes & Content
awesome-footnotes
Allows post authors to easily add and manage footnotes in posts.
CM Footnotes – Boost your content’s credibility with footnotes, citations, and bibliography
cm-footnotes
Add and manage footnotes, citations, and bibliography with this footnotes Plugin. Improve clarity and provide references.
Endnotes
endnotes
Easily add footnotes to your posts and pages.
Better Footnotes
better-footnotes
A robust solution to provide a fast reference and link to additional information for your readers
Footnotes Made Easy Developer Profile
3 plugins · 2K total installs
How We Detect Footnotes Made Easy
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/footnotes-made-easy/css/dbad.cssfootnotes-made-easy/css/dbad.css?ver=dbad.css?ver=HTML / DOM Fingerprints
swas_wp_footnotes