Insecure Content Warning Security & Risk Analysis

wordpress.org/plugins/insecure-content-warning

Prevent editors from adding insecure content in the editor.

10 active installs v1.2.2 PHP 7.4+ WP 6.6+ Updated Apr 24, 2025
httpspublisherspublishingsecure-contentssl
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Insecure Content Warning Safe to Use in 2026?

Generally Safe

Score 100/100

Insecure Content Warning has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "insecure-content-warning" plugin, version 1.2.2, demonstrates a generally good security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities due to prepared statements, and a high percentage of properly escaped output are positive indicators. Furthermore, the plugin has no recorded vulnerabilities, including CVEs, suggesting a history of secure development or effective patching if issues have arisen in the past.

However, there are specific areas of concern that warrant attention. The presence of one unprotected REST API route represents a significant attack surface that could potentially be exploited by unauthenticated users. While there are no critical taint flows identified, the lack of nonce checks for any of the entry points is a missed opportunity for enhanced security, especially considering the unprotected REST API route. The plugin also makes external HTTP requests, which, while not inherently insecure, can introduce risks if not handled carefully, depending on the nature of these requests.

In conclusion, while the plugin benefits from a strong foundation of secure coding practices and a clean vulnerability history, the unprotected REST API endpoint is a notable weakness. The absence of nonce checks further amplifies this risk. Addressing the unprotected endpoint and implementing appropriate authorization checks would significantly improve the plugin's overall security. The external HTTP requests are a minor concern that would require further investigation into their implementation.

Key Concerns

  • Unprotected REST API route
  • No nonce checks on entry points
Vulnerabilities
None known

Insecure Content Warning Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Insecure Content Warning Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
28 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

97% escaped29 total outputs
Attack Surface
1 unprotected

Insecure Content Warning Attack Surface

Entry Points3
Unprotected1

REST API Routes 3

GET/wp-json/icw/v1/check/includes\rest.php:25
POST/wp-json/icw/v1/count-for-fix/includes\rest.php:35
POST/wp-json/icw/v1/fix/includes\rest.php:101
WordPress Hooks 8
actionadmin_menuincludes\admin.php:18
actioninitincludes\assets.php:14
actionenqueue_block_editor_assetsincludes\assets.php:15
actionadmin_enqueue_scriptsincludes\assets.php:16
filtermce_cssincludes\assets.php:17
actionadmin_noticesincludes\assets.php:18
actionrest_api_initincludes\rest.php:18
actionadmin_noticesinsecure-content-warning.php:51
Maintenance & Trust

Insecure Content Warning Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 24, 2025
PHP min version7.4
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Insecure Content Warning Developer Profile

10up

23 plugins · 1.4M total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
546 days
View full developer profile
Detection Fingerprints

How We Detect Insecure Content Warning

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/insecure-content-warning/build/gutenberg.css/wp-content/plugins/insecure-content-warning/build/classic-editor.css/wp-content/plugins/insecure-content-warning/build/admin.js/wp-content/plugins/insecure-content-warning/build/gutenberg.js/wp-content/plugins/insecure-content-warning/build/classic-editor.js
Script Paths
/wp-content/plugins/insecure-content-warning/build/gutenberg.js/wp-content/plugins/insecure-content-warning/build/classic-editor.js/wp-content/plugins/insecure-content-warning/build/admin.js
Version Parameters
insecure-content-warning/build/gutenberg.css?ver=insecure-content-warning/build/classic-editor.css?ver=insecure-content-warning/build/admin.js?ver=insecure-content-warning/build/gutenberg.js?ver=insecure-content-warning/build/classic-editor.js?ver=

HTML / DOM Fingerprints

JS Globals
insecureContentAdmin
REST Endpoints
/wp-json/icw/v1/check//wp-json/icw/v1/count-for-fix/
FAQ

Frequently Asked Questions about Insecure Content Warning