fVote Security & Risk Analysis

wordpress.org/plugins/fvote

A plugin for specific niche questions your vistors can vote for.

10 active installs v0.51 PHP + WP 3.0+ Updated Dec 7, 2015
pollquestionaryvotevoting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is fVote Safe to Use in 2026?

Generally Safe

Score 85/100

fVote has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "fvote" plugin v0.51 exhibits a mixed security posture. On the positive side, there are no known CVEs, no identified critical or high severity taint flows, and no dangerous functions detected in the static analysis. The attack surface is also relatively small, with only two shortcodes as entry points and no AJAX handlers or REST API routes that appear to be unprotected by default.

However, significant concerns arise from the lack of fundamental security practices in the codebase. All three detected SQL queries are executed without prepared statements, posing a substantial risk of SQL injection. Furthermore, none of the nine detected output operations are properly escaped, leaving the plugin vulnerable to cross-site scripting (XSS) attacks. The complete absence of nonce checks and capability checks, especially with shortcodes as entry points, further exacerbates these risks by allowing unauthenticated or unauthorized users to potentially trigger code execution or manipulate data.

The plugin's vulnerability history is clean, which is a positive sign, but it doesn't mitigate the immediate risks identified in the static analysis. The lack of past vulnerabilities could be due to the plugin's limited adoption or simply an oversight. In conclusion, while the plugin has a clean history, the current codebase contains critical vulnerabilities related to insecure SQL queries and unescaped output, compounded by a lack of essential authorization and nonce checks. These weaknesses create a high risk of exploitation.

Key Concerns

  • SQL queries not using prepared statements
  • Output not properly escaped
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

fVote Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

fVote Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

fVote Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

0% escaped9 total outputs
Attack Surface

fVote Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[fVote] fVote_core.php:97
[fVote_results] fVote_core.php:182
Maintenance & Trust

fVote Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedDec 7, 2015
PHP min version
Downloads2K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

fVote Developer Profile

theode

12 plugins · 230 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect fVote

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fvote/fvote.js/wp-content/plugins/fvote/fvote.css
Script Paths
/wp-content/plugins/fvote/fvote.js
Version Parameters
fvote/fvote.js?ver=fvote/fvote.css?ver=

HTML / DOM Fingerprints

CSS Classes
fVote-form
Data Attributes
name="fVote"name="submit"
Shortcode Output
<form name="fVote" action="<INPUT TYPE="submit" name="submit" value="
FAQ

Frequently Asked Questions about fVote