Get Custom Field Values Security & Risk Analysis

wordpress.org/plugins/get-custom-field-values

Use widgets, shortcodes, and/or template tags to easily retrieve and display custom field values for posts or pages.

1K active installs v4.1 PHP + WP 3.6+ Updated Oct 10, 2023
custom-fieldsmetashortcodewidgetwidgets
84
B · Generally Safe
CVEs total4
Unpatched0
Last CVEOct 11, 2023
Safety Verdict

Is Get Custom Field Values Safe to Use in 2026?

Mostly Safe

Score 84/100

Get Custom Field Values is generally safe to use though it hasn't been updated recently. 4 past CVEs were resolved.

4 known CVEsLast CVE: Oct 11, 2023Updated 2yr ago
Risk Assessment

The static analysis of 'get-custom-field-values' v4.1 reveals an excellent technical security posture in its current implementation. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly reduces the plugin's attack surface. Furthermore, the code exhibits strong security practices by exclusively using prepared statements for all SQL queries and having no identified dangerous functions or file operations. The lack of external HTTP requests and the absence of taint analysis findings further contribute to this positive assessment.

However, despite the clean state of the current version's code, the plugin's vulnerability history presents a significant concern. With four known medium-severity vulnerabilities, including Cross-Site Scripting and Missing Authorization, and a recent vulnerability in October 2023, this indicates a pattern of past security flaws. While these may be patched in the current version, the history suggests a potential for recurring vulnerabilities or areas that require ongoing vigilance. The complete absence of nonce and capability checks in the static analysis, while not directly exploitable due to the lack of exposed entry points, is a weakness that could become a risk if the plugin's functionality were to expand or change.

In conclusion, 'get-custom-field-values' v4.1 demonstrates strong adherence to secure coding practices regarding its current codebase, with minimal direct security risks detectable through static analysis. The plugin's strength lies in its limited and well-protected entry points. The primary weakness stems from its past vulnerability record, which necessitates cautiousness and thorough testing. The lack of explicit capability and nonce checks, while not an immediate threat in this version, is an area for potential future risk if the plugin's architecture evolves.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
  • Vulnerability History (4 Medium CVEs)
  • Past Vulnerability Type: XSS
  • Past Vulnerability Type: Missing Authorization
  • Output Escaping (55% proper)
Vulnerabilities
4 published

Get Custom Field Values Security Vulnerabilities

CVEs by Year

2 CVEs in 2021
2021
2 CVEs in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
4

4 total CVEs

CVE-2023-45604medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Get Custom Field Values <= 4.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via plugin widget

Oct 11, 2023 Patched in 4.1 (104d)
WF-66e55302-f889-4054-817f-aadbdd3c88de-get-custom-field-valuesmedium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Get Custom Field Values <= 4.0.1 - Authenticated(Contributor+) Stored Cross-Site Scripting via Custom Meta Widget

Oct 10, 2023 Patched in 4.1 (105d)
CVE-2021-24871medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Get Custom Field Values <= 4.0.0 - Contributor+ Stored Cross-Site Scripting

Nov 9, 2021 Patched in 4.0.1 (805d)
CVE-2021-24872medium · 6.5Missing Authorization

Get Custom Field Values < 4.0 - Arbitrary Post Metadata Access

Nov 9, 2021 Patched in 4.0 (805d)
Version History

Get Custom Field Values Release Timeline

v4.1Current
Code Analysis
Analyzed Mar 16, 2026

Get Custom Field Values Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
8 prepared
Unescaped Output
15
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared8 total queries

Output Escaping

55% escaped33 total outputs
Attack Surface

Get Custom Field Values Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
filterthe_metaget-custom-field-values.php:338
actionload-post.phpget-custom.shortcode.php:62
actionload-post-new.phpget-custom.shortcode.php:63
filterdefault_hidden_meta_boxesget-custom.shortcode.php:64
actionadmin_print_footer_scriptsget-custom.shortcode.php:73
actiondo_meta_boxesget-custom.shortcode.php:74
actioninitget-custom.shortcode.php:355
actionwidgets_initget-custom.widget.php:255
Maintenance & Trust

Get Custom Field Values Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedOct 10, 2023
PHP min version
Downloads132K

Community Trust

Rating100/100
Number of ratings4
Active installs1K
Developer Profile

Get Custom Field Values Developer Profile

Scott Reilly

63 plugins · 92K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
374 days
View full developer profile
Detection Fingerprints

How We Detect Get Custom Field Values

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/get-custom-field-values/get-custom.css/wp-content/plugins/get-custom-field-values/get-custom.js
Script Paths
/wp-content/plugins/get-custom-field-values/get-custom.js
Version Parameters
get-custom-field-values/get-custom.css?ver=get-custom-field-values/get-custom.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Get Custom Field Values