Link To Bible Security & Risk Analysis

wordpress.org/plugins/link-to-bible

Links bible-references in posts automatically to the appropriate bible-verse(s) at bibleserver.com.

200 active installs v3.0.6 PHP 5.6+ WP 5.2+ Updated Mar 5, 2026
bibelbiblebible-referencebible-versebibleserver-com
99
A · Safe
CVEs total1
Unpatched0
Last CVEJul 6, 2024
Safety Verdict

Is Link To Bible Safe to Use in 2026?

Generally Safe

Score 99/100

Link To Bible has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Jul 6, 2024Updated 1mo ago
Risk Assessment

The "link-to-bible" plugin v3.0.6 exhibits a mixed security posture. On the positive side, the static analysis reveals no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in zero entry points and a seemingly minimal attack surface. Furthermore, all SQL queries are correctly utilizing prepared statements, and there are no reported critical or high-severity vulnerabilities in its history. However, significant concerns arise from the complete lack of output escaping (0% properly escaped) and the absence of any nonce or capability checks. This indicates a high likelihood of cross-site scripting (XSS) vulnerabilities, as user-controlled data is likely being rendered directly into the page without sanitization. The single medium-severity vulnerability in its history, identified as Cross-site Scripting, further corroborates this risk, despite being patched. The presence of file operations and external HTTP requests, while not directly flagged as vulnerable in this analysis, warrants careful scrutiny in conjunction with the lack of proper output escaping.

Key Concerns

  • 0% output escaping
  • No nonce checks
  • No capability checks
  • 1 medium CVE (XSS)
Vulnerabilities
1

Link To Bible Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-37538medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Link To Bible <= 2.5.9 - Authenticated (Administrator+) Stored Cross-Site Scripting

Jul 6, 2024 Patched in 2.5.10 (70d)
Code Analysis
Analyzed Mar 16, 2026

Link To Bible Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Link To Bible Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Link To Bible Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 5, 2026
PHP min version5.6
Downloads12K

Community Trust

Rating82/100
Number of ratings10
Active installs200
Developer Profile

Link To Bible Developer Profile

thomask777

1 plugin · 200 total installs

87
trust score
Avg Security Score
99/100
Avg Patch Time
70 days
View full developer profile
Detection Fingerprints

How We Detect Link To Bible

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/link-to-bible/resources/css/admin-style.css/wp-content/plugins/link-to-bible/resources/css/style.css/wp-content/plugins/link-to-bible/resources/js/admin.js/wp-content/plugins/link-to-bible/resources/js/link-to-bible.js
Script Paths
/wp-content/plugins/link-to-bible/resources/js/admin.js/wp-content/plugins/link-to-bible/resources/js/link-to-bible.js
Version Parameters
link-to-bible/resources/css/admin-style.css?ver=link-to-bible/resources/css/style.css?ver=link-to-bible/resources/js/admin.js?ver=link-to-bible/resources/js/link-to-bible.js?ver=

HTML / DOM Fingerprints

CSS Classes
ltb_options_form
Data Attributes
id="langsel"id="bversel"id="ltb_aak_cb"id="ltb_apikey_inp"id="ltb_apikeynote"name="ltb_options[aak_on]"+4 more
JS Globals
jQuery(document).readyjQuery.getJSON
FAQ

Frequently Asked Questions about Link To Bible