Igemutató Security & Risk Analysis

wordpress.org/plugins/igemutato

Az oldal tartalmában található szentírási hivatkozásokat jeleníti meg felugró szövegbuborékban

10 active installs v1.6.3 PHP + WP 2.7+ Updated Jan 8, 2026
biblebibliaszentirastooltip
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Igemutató Safe to Use in 2026?

Generally Safe

Score 100/100

Igemutató has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "igemutato" v1.6.3 plugin exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of identified AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests, which are common vectors for exploitation. The plugin also demonstrates good practice by utilizing prepared statements for all SQL queries.

However, a notable concern is the output escaping. With 46 total outputs and only 37% properly escaped, there's a significant risk of cross-site scripting (XSS) vulnerabilities. This means that user-supplied or unsanitized data could be rendered directly in the browser, allowing an attacker to inject malicious scripts. The complete lack of nonce checks and capability checks, while potentially not an issue if there are no direct user-facing interactions or sensitive operations, represents a missed opportunity to implement standard WordPress security measures and could become a vulnerability if the plugin's functionality evolves.

The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive indicator. However, this historical data alone doesn't negate the risks identified in the static analysis, particularly the output escaping. In conclusion, while the plugin is currently free of known historical vulnerabilities and has a minimal attack surface, the significant amount of improperly escaped output presents a clear and actionable security risk that should be addressed.

Key Concerns

  • Significant amount of unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Igemutató Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Igemutató Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
29
17 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

37% escaped46 total outputs
Attack Surface

Igemutató Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_enqueue_scriptsigemutato.php:31
actionwp_footerigemutato.php:33
actionadmin_initigemutato.php:36
actionadmin_menuigemutato.php:38
Maintenance & Trust

Igemutató Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 8, 2026
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Igemutató Developer Profile

molnarm

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Igemutató

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/igemutato/igemutato.min.css
Script Paths
/wp-content/plugins/igemutato/igemutato.min.js
Version Parameters
igemutato/igemutato.min.css?ver=igemutato/igemutato.min.js?ver=

HTML / DOM Fingerprints

JS Globals
igemutato
FAQ

Frequently Asked Questions about Igemutató