ICPBEIAN Security & Risk Analysis

wordpress.org/plugins/icpbeian

Adds ICP information to your site footer with shortcode.

0 active installs v1.00.0 PHP 5.2+ WP 3.6+ Updated Apr 14, 2022
icpicpbeian%e5%a4%87%e6%a1%88
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ICPBEIAN Safe to Use in 2026?

Generally Safe

Score 85/100

ICPBEIAN has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "icpbeian" plugin v1.00.0 demonstrates a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities, file operations, and external HTTP requests is highly positive. Furthermore, the use of prepared statements for all SQL queries and proper escaping for 80% of its outputs indicates a conscious effort towards secure coding practices. The plugin also has a clean vulnerability history, with no recorded CVEs, suggesting a lack of previously discovered exploitable flaws.

However, there are some areas for concern. The lack of nonce checks and capability checks, particularly when dealing with the single shortcode entry point, represents a potential weakness. While the attack surface is currently small, the absence of these critical security mechanisms means that any functionality exposed by the shortcode could be triggered without proper authorization or verification. Taint analysis also shows no flows, which is good, but this could also indicate limited analysis or that the plugin's functionality doesn't expose sensitive data in a way that the tools could detect.

In conclusion, "icpbeian" v1.00.0 has a solid foundation in terms of preventing common vulnerabilities like SQL injection and dangerous function usage. Its clean history is also reassuring. The primary risk lies in the potential for unauthorized execution of its shortcode functionality due to the missing nonce and capability checks. This, combined with the high percentage of properly escaped outputs (leaving room for potential unescaped data), warrants careful consideration.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
  • Some output not properly escaped
Vulnerabilities
None known

ICPBEIAN Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

ICPBEIAN Release Timeline

v1.00.0Current
Code Analysis
Analyzed Mar 17, 2026

ICPBEIAN Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped5 total outputs
Attack Surface

ICPBEIAN Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[icpbeian] icpbeian.php:66
WordPress Hooks 3
actionadmin_initicpbeian.php:39
actioniniticpbeian.php:40
actioniniticpbeian.php:83
Maintenance & Trust

ICPBEIAN Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedApr 14, 2022
PHP min version5.2
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

ICPBEIAN Developer Profile

amazingzhang

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ICPBEIAN

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
beianflag
Data Attributes
data-label_forname="icpbeianID"id="icpbeianID"
Shortcode Output
<a id="beianflag" class="beianflag" href="https://beian.miit.gov.cn/">
FAQ

Frequently Asked Questions about ICPBEIAN