Inject-O-Matic Security & Risk Analysis

wordpress.org/plugins/inject-o-matic

Inject custom jQuery/Javascript into the header and/or footer of a WordPress site.

30 active installs v1.0.0 PHP + WP 3.5+ Updated May 22, 2015
headerinjectjavascriptjqueryscript
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Inject-O-Matic Safe to Use in 2026?

Generally Safe

Score 85/100

Inject-O-Matic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "inject-o-matic" v1.0.0 plugin presents a mixed security profile. On the positive side, there are no known vulnerabilities (CVEs) in its history and the static analysis shows a complete absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests. Furthermore, all SQL queries utilize prepared statements, and there is at least one capability check present, indicating some awareness of WordPress security practices.

However, a significant concern arises from the complete lack of output escaping for all identified outputs. This means that any data rendered by the plugin, even if it doesn't appear to be directly user-supplied in this version, is not being protected against potential injection attacks if future versions or interactions introduce such data. The absence of any taint analysis results and the minimal attack surface are either due to the plugin's simplicity or potentially incomplete analysis, making it difficult to fully assess the risk of unseen vulnerabilities.

In conclusion, while the plugin has a clean vulnerability history and avoids many common pitfalls, the universal lack of output escaping is a critical weakness that significantly elevates the risk. The absence of taint analysis and the minimal observed attack surface might suggest a simple plugin, but the unescaped output leaves it exposed to XSS if its functionality evolves or interacts with dynamic data. The presence of a capability check is a good sign, but it's overshadowed by the output sanitization deficiency.

Key Concerns

  • All outputs are unescaped
Vulnerabilities
None known

Inject-O-Matic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Inject-O-Matic Release Timeline

v1.0.0Current
v0.2
Code Analysis
Analyzed Mar 16, 2026

Inject-O-Matic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Attack Surface

Inject-O-Matic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwp_enqueue_scriptsinject-o-matic.php:60
actionwp_footerinject-o-matic.php:63
actionadmin_menuinject-o-matic.php:66
actionadmin_initinject-o-matic.php:67
Maintenance & Trust

Inject-O-Matic Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedMay 22, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Inject-O-Matic Developer Profile

Baden

3 plugins · 140 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Inject-O-Matic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
injectomat
Data Attributes
id="injectomat[custom_header_script]"name="injectomat[custom_header_script]"id="injectomat[custom_header_inject]"name="injectomat[custom_header_inject]"id="injectomat[custom_footer_script]"name="injectomat[custom_footer_script]"+2 more
FAQ

Frequently Asked Questions about Inject-O-Matic