FriendlyCase Security & Risk Analysis

wordpress.org/plugins/friendlycase

Reformat titles from 'ALL CAPS' to 'All Caps' and enable friendly, word capitalization in posts, pages and more.

10 active installs v1.0.7 PHP + WP 3.1+ Updated Sep 15, 2014
friendlycasesentence-casetextstitletitlecase
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is FriendlyCase Safe to Use in 2026?

Generally Safe

Score 85/100

FriendlyCase has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "friendlycase" plugin version 1.0.7 exhibits a strong security posture based on the provided static analysis and vulnerability history. The complete absence of identified attack surface points, dangerous functions, raw SQL queries, file operations, external HTTP requests, and taint flows suggests a well-secured codebase. The presence of 100% prepared statements for SQL queries is a significant positive indicator of safe database interaction.

However, the static analysis reveals a critical weakness: 0% of output escaping is properly implemented. This means that any dynamic data displayed by the plugin, even if not directly exploitable through the analyzed entry points, could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is reflected directly in the output. The lack of capability checks and nonce checks, while not directly linked to discovered entry points, are generally considered good security practices for WordPress plugins, and their absence leaves room for potential privilege escalation or unauthorized actions if new, unprotected entry points were to be introduced in future versions.

Overall, the plugin's strength lies in its minimal and seemingly secure attack surface and database handling. The primary and significant concern is the complete lack of output escaping, which is a fundamental security requirement. The absence of any historical vulnerabilities is encouraging but should not negate the importance of addressing the identified output escaping issue.

Key Concerns

  • Output escaping is not implemented
Vulnerabilities
None known

FriendlyCase Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FriendlyCase Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

FriendlyCase Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterthe_titlefriendlycase.php:40
actionadmin_initfriendlycase.php:75
actionadmin_menufriendlycase.php:76
Maintenance & Trust

FriendlyCase Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 15, 2014
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

FriendlyCase Developer Profile

kelter

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FriendlyCase

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
fc_lcfc_ucfc_ig
HTML Comments
License: GPLCopyright (C) 2011 - 2012, Joseph Kelter, Saul Rosenbaum,Sharon Rooney Rosshttp://badcat.com , http://visualchutzpah.com,+15 more
Data Attributes
fc-wrapfc-tablefc-rowfc-textarea
FAQ

Frequently Asked Questions about FriendlyCase