Link Vault Security & Risk Analysis

wordpress.org/plugins/link-vault

Link Vault is a WordPress plugin that adds a widget to your post editor allowing you to easily drag and drop commonly used hyperlinks.

10 active installs v1.0.9 PHP + WP 3.1+ Updated Mar 9, 2011
affiliate-linkscopywritinghyperlinklink-managerpost-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Link Vault Safe to Use in 2026?

Generally Safe

Score 85/100

Link Vault has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "link-vault" v1.0.9 plugin exhibits a mixed security posture. On the positive side, it has no reported CVEs, a zero attack surface in terms of entry points like AJAX, REST API, shortcodes, and cron events, and no file operations or external HTTP requests. However, significant concerns arise from the static analysis. A critical weakness is that 100% of its 54 outputs are not properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the taint analysis revealed two high-severity flows with unsanitized paths, indicating potential injection vulnerabilities that could be exploited if data from these flows is not handled carefully. While the plugin has no vulnerability history and uses prepared statements for a majority of its SQL queries, the complete lack of output escaping and the presence of high-severity unsanitized taint flows are serious oversights that negate the benefits of its limited attack surface and clean vulnerability history. Users should be aware that the absence of historical vulnerabilities does not guarantee current security, especially given the evident lack of fundamental security practices in output handling.

Key Concerns

  • 100% of outputs are unescaped
  • 2 high severity unsanitized taint flows
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Link Vault Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Link Vault Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
2 prepared
Unescaped Output
54
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

67% prepared3 total queries

Output Escaping

0% escaped54 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
<link-vault> (views\link-vault.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Link Vault Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuwp-link-vault.php:21
actionadmin_menuwp-link-vault.php:98
Maintenance & Trust

Link Vault Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedMar 9, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Link Vault Developer Profile

derickschaefer

5 plugins · 30 total installs

90
trust score
Avg Security Score
94/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Link Vault

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/link-vault/css/wpLinkVault.css
Version Parameters
wpLinkVault/1.0.8

HTML / DOM Fingerprints

HTML Comments
//-->
Data Attributes
id="clearLinkid="clearLinkValueonclick="deleteLinkVault(onclick="deleteWpLinkVault(
JS Globals
WpLinkVaultwpLinkVault
FAQ

Frequently Asked Questions about Link Vault