Influential Commenters Security & Risk Analysis

wordpress.org/plugins/influential-commenters

This plugin shows your top 100 most influential commenters on your Wordpress blog, ordered by Alexa Rank.

10 active installs v1 PHP + WP 2.0.2+ Updated Jul 14, 2012
alexacommentersfacebook-sharesgoogle-backlinkstop-commenters
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Influential Commenters Safe to Use in 2026?

Generally Safe

Score 85/100

Influential Commenters has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "influential-commenters" v1 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no identified vulnerabilities in its history, and the code demonstrates good practices like using prepared statements for its single SQL query. There are no identified dangerous functions, external HTTP requests, or bundled libraries. The attack surface is also reported as zero, with no AJAX handlers, REST API routes, shortcodes, or cron events, and crucially, no unprotected entry points. This suggests a generally secure foundation with minimal exposure to common attack vectors.

However, there are significant concerns highlighted by the static analysis. The most glaring issue is the extremely low percentage of properly escaped output (22%), indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. Despite the absence of explicit taint flows in this specific analysis, the lack of output sanitization on a substantial portion of outputs is a serious weakness. Furthermore, the absence of nonce checks and capability checks on any potential entry points (even if the reported attack surface is zero, this could be an oversight or a reporting limitation) is a significant concern for authorization and security enforcement. The file operation, while singular, also lacks context on its security implications without further review.

In conclusion, while the plugin has a clean vulnerability history and a minimal attack surface, the severe lack of output escaping and the absence of essential security checks like nonces and capability checks present a substantial risk. These weaknesses, if exploited, could lead to serious security breaches like XSS. The plugin would benefit greatly from thorough output sanitization and the implementation of proper authorization checks.

Key Concerns

  • Low output escaping (22%)
  • No nonce checks
  • No capability checks
  • File operation without context
Vulnerabilities
None known

Influential Commenters Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Influential Commenters Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
7
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

22% escaped9 total outputs
Attack Surface

Influential Commenters Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menumain.php:11
Maintenance & Trust

Influential Commenters Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedJul 14, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Influential Commenters Developer Profile

graemeboy

4 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Influential Commenters

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/influential-commenters/style.css
Version Parameters
influential-commenters/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
infc_head
FAQ

Frequently Asked Questions about Influential Commenters