FourEyes Security & Risk Analysis

wordpress.org/plugins/foureyes

The FourEyes Plugin makes it quick and easy to embed surveys onto your Wordpress posts or pages.

10 active installs v1.0.1 PHP + WP 2.5+ Updated Dec 9, 2016
embedfoureyessurveysurveys
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FourEyes Safe to Use in 2026?

Generally Safe

Score 85/100

FourEyes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The foureyes v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. There are no identified dangerous functions, SQL injection vulnerabilities, or output escaping issues, indicating good development practices in these areas. The absence of external HTTP requests and file operations further reduces the potential attack surface. The plugin also has no recorded vulnerability history, suggesting a consistent focus on security by its developers.

However, a significant concern arises from the complete lack of nonces and capability checks. While the attack surface is currently zero, this omission represents a critical weakness. If any entry points (AJAX, REST API, shortcodes) were to be introduced in future versions without proper authorization checks, the plugin would be highly susceptible to various attacks. The absence of taint analysis findings is positive, but the lack of any identified entry points makes it impossible to definitively conclude on its robustness against complex, chained exploits.

In conclusion, foureyes v1.0.1 is currently a very low-risk plugin due to its limited functionality and absence of known vulnerabilities. The development team has clearly followed best practices regarding SQL queries and output escaping. The primary weakness is the lack of authorization checks, which, while not a current exploit, leaves the plugin vulnerable should its attack surface expand. A strong recommendation would be to implement nonces and capability checks on any future functionality.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

FourEyes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

FourEyes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

FourEyes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterplugin_row_metafoureyes.php:24
actionadmin_menufoureyes.php:47
filterwidget_textFourEyes_Plugin.php:33
Maintenance & Trust

FourEyes Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 9, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

FourEyes Developer Profile

sparklit

2 plugins · 310 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FourEyes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/foureyes/js/embed.js

HTML / DOM Fingerprints

CSS Classes
foureyes-embed
Data Attributes
data-survey
Shortcode Output
<script src="https://getfoureyes.com/js/embed.js">{"url":"https://getfoureyes.com/s/"}</script><div class="foureyes-embed"
FAQ

Frequently Asked Questions about FourEyes