Hangman Security & Risk Analysis

wordpress.org/plugins/hangman

A cool version of the traditional hangman. Dictionary composed of 14000 English words. Powered by the jQuery library, AJAX and PHP.

100 active installs v1.0 PHP + WP + Updated May 28, 2023
gamegameshangman
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Hangman Safe to Use in 2026?

Generally Safe

Score 85/100

Hangman has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "hangman" v1.0 plugin presents a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) or known security advisories, and the code does not utilize dangerous functions or make external HTTP requests. Furthermore, all SQL queries are properly prepared, which is a significant strength in preventing SQL injection. However, the plugin has a notable weakness in its handling of entry points. Out of three identified entry points, two are AJAX handlers that lack authentication checks. This exposes the plugin to potential unauthorized access and execution of unintended functions.

While the static analysis did not reveal any critical or high-severity taint flows or direct code injection risks, the absence of proper output escaping on a significant portion of its outputs (68%) is a concern. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not adequately sanitized before being displayed. The lack of nonce checks on the unprotected AJAX handlers further compounds this risk, as it makes it easier for attackers to craft malicious requests. The overall lack of capability checks is also a general security concern, as it suggests that actions might be performed by users who should not have permission.

Given the absence of historical vulnerabilities and the presence of some good security practices like prepared SQL statements, the plugin is not inherently malicious. However, the identified weaknesses, particularly the unprotected AJAX handlers and insufficient output escaping, create a genuine risk. Mitigating these issues is crucial to improving the plugin's security and preventing potential exploitation.

Key Concerns

  • Unprotected AJAX handlers
  • Insufficient output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Hangman Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hangman Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

32% escaped25 total outputs
Attack Surface
2 unprotected

Hangman Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_hangman_ajaxhangman.php:81
noprivwp_ajax_hangman_ajaxhangman.php:82

Shortcodes 1

[hangman] hangman.php:15
WordPress Hooks 1
actioninithangman.php:74
Maintenance & Trust

Hangman Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedMay 28, 2023
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings3
Active installs100
Developer Profile

Hangman Developer Profile

Marc Oliveras

2 plugins · 120 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hangman

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hangman/css/style.css
Version Parameters
hangman/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
guessed-letter
Shortcode Output
[hangman]
FAQ

Frequently Asked Questions about Hangman