Jetpack Widget Visibility – Query Args Security & Risk Analysis

wordpress.org/plugins/jetpack-widget-visibility-additional-fields-query-args

This plugin adds query args to the Jetpack Widget Visibility module.

10 active installs v1.0.0 PHP + WP 3.5.1+ Updated Dec 18, 2014
extendjetpackvisibilitywidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jetpack Widget Visibility – Query Args Safe to Use in 2026?

Generally Safe

Score 85/100

Jetpack Widget Visibility – Query Args has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

This plugin exhibits a strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, coupled with zero detected dangerous functions or file operations, indicates a minimal attack surface. The use of prepared statements for all SQL queries is a significant strength, preventing common SQL injection vulnerabilities. However, the low percentage of properly escaped output (33%) presents a concern. This suggests that some data displayed to users might not be adequately sanitized, potentially leading to cross-site scripting (XSS) vulnerabilities if user-controlled input is reflected directly in the output without proper escaping. The plugin's vulnerability history is entirely clean, with no known CVEs, which is highly positive. Overall, while the core functionality appears robust and protected against common server-side attacks, the lack of comprehensive output escaping warrants attention and a potential for improvement.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Jetpack Widget Visibility – Query Args Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jetpack Widget Visibility – Query Args Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Jetpack Widget Visibility – Query Args Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped3 total outputs
Attack Surface

Jetpack Widget Visibility – Query Args Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_headjetpack-widget-visibility-query-args.php:78
filterwidget_conditions_defaultsjetpack-widget-visibility-query-args.php:83
filterwidget_visibility_conditionsjetpack-widget-visibility-query-args.php:84
filterwidget_visibility_minor_visiblejetpack-widget-visibility-query-args.php:85
filterwidget_visibility_filter_widgetjetpack-widget-visibility-query-args.php:86
actionadmin_initjetpack-widget-visibility-query-args.php:88
actionwidget_visibility_condition_majorjetpack-widget-visibility-query-args.php:89
actionwidget_visibility_additional_fieldsjetpack-widget-visibility-query-args.php:90
Maintenance & Trust

Jetpack Widget Visibility – Query Args Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 18, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Jetpack Widget Visibility – Query Args Developer Profile

Brandon Lavigne

5 plugins · 170 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jetpack Widget Visibility – Query Args

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
conditions-rule-query-var
Data Attributes
data-brandon
FAQ

Frequently Asked Questions about Jetpack Widget Visibility – Query Args