
Get Custom Field Values Security & Risk Analysis
wordpress.org/plugins/get-custom-field-valuesUse widgets, shortcodes, and/or template tags to easily retrieve and display custom field values for posts or pages.
Is Get Custom Field Values Safe to Use in 2026?
Mostly Safe
Score 84/100Get Custom Field Values is generally safe to use though it hasn't been updated recently. 4 past CVEs were resolved.
The static analysis of 'get-custom-field-values' v4.1 reveals an excellent technical security posture in its current implementation. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly reduces the plugin's attack surface. Furthermore, the code exhibits strong security practices by exclusively using prepared statements for all SQL queries and having no identified dangerous functions or file operations. The lack of external HTTP requests and the absence of taint analysis findings further contribute to this positive assessment.
However, despite the clean state of the current version's code, the plugin's vulnerability history presents a significant concern. With four known medium-severity vulnerabilities, including Cross-Site Scripting and Missing Authorization, and a recent vulnerability in October 2023, this indicates a pattern of past security flaws. While these may be patched in the current version, the history suggests a potential for recurring vulnerabilities or areas that require ongoing vigilance. The complete absence of nonce and capability checks in the static analysis, while not directly exploitable due to the lack of exposed entry points, is a weakness that could become a risk if the plugin's functionality were to expand or change.
In conclusion, 'get-custom-field-values' v4.1 demonstrates strong adherence to secure coding practices regarding its current codebase, with minimal direct security risks detectable through static analysis. The plugin's strength lies in its limited and well-protected entry points. The primary weakness stems from its past vulnerability record, which necessitates cautiousness and thorough testing. The lack of explicit capability and nonce checks, while not an immediate threat in this version, is an area for potential future risk if the plugin's architecture evolves.
Key Concerns
- Missing Nonce Checks
- Missing Capability Checks
- Vulnerability History (4 Medium CVEs)
- Past Vulnerability Type: XSS
- Past Vulnerability Type: Missing Authorization
- Output Escaping (55% proper)
Get Custom Field Values Security Vulnerabilities
CVEs by Year
Severity Breakdown
4 total CVEs
Get Custom Field Values <= 4.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin widget
Get Custom Field Values <= 4.0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Custom Meta Widget
Get Custom Field Values <= 4.0.0 - Contributor+ Stored Cross-Site Scripting
Get Custom Field Values < 4.0 - Arbitrary Post Metadata Access
Get Custom Field Values Release Timeline
Get Custom Field Values Code Analysis
SQL Query Safety
Output Escaping
Get Custom Field Values Attack Surface
WordPress Hooks 8
Maintenance & Trust
Get Custom Field Values Maintenance & Trust
Maintenance Signals
Community Trust
Get Custom Field Values Alternatives
Ocean Extra
ocean-extra
The ultimate companion for OceanWP. Adds local Google Fonts, mega menus, site templates, and per-page settings for total design authority.
Apollo13 Framework Extensions
apollo13-framework-extensions
Adds custom post types, shortcodes and some features that are used in themes built on Apollo13 Framework.
Weaver Xtreme Theme Support
weaverx-theme-support
A useful shortcode and widget collection for Weaver Xtreme
Popularis Extra
popularis-extra
Popularis Extra add extra features to Popularis theme like demo import, widgets, shortcodes or Elementor widgets.
Disable Author Pages
disable-author-pages
Disable the author pages
Get Custom Field Values Developer Profile
63 plugins · 92K total installs
How We Detect Get Custom Field Values
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/get-custom-field-values/get-custom.css/wp-content/plugins/get-custom-field-values/get-custom.js/wp-content/plugins/get-custom-field-values/get-custom.jsget-custom-field-values/get-custom.css?ver=get-custom-field-values/get-custom.js?ver=