Link View Security & Risk Analysis

wordpress.org/plugins/link-view

Display a link-list or link-slider in a post or page by using a shortcode.

800 active installs v0.8.0 PHP 5.6+ WP 4.9+ Updated Nov 29, 2020
blogrolllinklinkslinkviewview
42
D · High Risk
CVEs total2
Unpatched2
Last CVEAug 25, 2025
Safety Verdict

Is Link View Safe to Use in 2026?

High Risk

Score 42/100

Link View carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.

2 known CVEs 2 unpatched Last CVE: Aug 25, 2025Updated 5yr ago
Risk Assessment

The 'link-view' plugin v0.8.0 exhibits a mixed security posture. On the positive side, static analysis reveals excellent practices with 100% of SQL queries using prepared statements and a very high percentage (98%) of output escaping. The attack surface is minimal, with only one shortcode and no unprotected entry points from AJAX, REST API, or cron events. There are also capability checks present in the code.

However, significant concerns arise from the plugin's vulnerability history. With two known CVEs, both currently unpatched and classified as medium severity, this indicates a recurring pattern of potential vulnerabilities. The common vulnerability type being Cross-site Scripting (XSS) suggests that user-supplied data might not always be handled securely, despite the generally good output escaping observed in static analysis. The presence of these unpatched vulnerabilities is the most critical risk factor.

In conclusion, while the code itself appears to follow many good security practices, the existence of two unpatched medium severity vulnerabilities, specifically XSS, is a substantial risk. The plugin's developers need to address these known issues promptly. Users should be aware that despite the static analysis results showing good code hygiene, the historical data points to a past need for more robust input validation and output sanitization that may not have been fully addressed.

Key Concerns

  • Unpatched CVE (Medium severity)
  • Unpatched CVE (Medium severity)
  • 0 Nonce checks present
Vulnerabilities
2

Link View Security Vulnerabilities

CVEs by Year

2 CVEs in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2025-48110medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Link View <= 0.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

Aug 25, 2025Unpatched
CVE-2025-49039medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Link View <= 0.8.0 - Authenticated (Administrator+) Stored Cross-Site Scripting

Aug 19, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Link View Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
79 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

98% escaped81 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<about> (admin\about.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Link View Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[linkview] link-view.php:80
WordPress Hooks 10
actionadmin_menuadmin\admin.php:52
actionplugins_loadedadmin\admin.php:53
actionadmin_initincludes\config.php:48
filterpre_update_option_lvw_req_manages_link_roleincludes\config.php:49
actionplugins_loadedlink-view.php:79
actionwidgets_initlink-view.php:81
filterpre_option_link_manager_enabledlink-view.php:84
actionwp_enqueue_scriptslink-view.php:93
actionprint_late_stylesshortcode\factory.php:51
actionwp_footershortcode\factory.php:52
Maintenance & Trust

Link View Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedNov 29, 2020
PHP min version5.6
Downloads55K

Community Trust

Rating94/100
Number of ratings11
Active installs800
Developer Profile

Link View Developer Profile

mibuthu

1 plugin · 800 total installs

53
trust score
Avg Security Score
42/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Link View

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/link-view/admin/css/about.css/wp-content/plugins/link-view/admin/css/settings.css/wp-content/plugins/link-view/includes/js/easySlider.min.js/wp-content/plugins/link-view/includes/js/masonry.pkgd.min.js
Script Paths
/wp-content/plugins/link-view/includes/js/easySlider.min.js/wp-content/plugins/link-view/includes/js/masonry.pkgd.min.js
Version Parameters
link-view/admin/css/about.css?ver=link-view/admin/css/settings.css?ver=link-view/includes/js/easySlider.min.js?ver=link-view/includes/js/masonry.pkgd.min.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-lvw-sliderdata-lvw-slider-options
Shortcode Output
[linkview
FAQ

Frequently Asked Questions about Link View