
Logo Manager For Enamad Security & Risk Analysis
wordpress.org/plugins/logo-manager-for-enamadجهت قراردادن خودکار لوگوی نماد الکترونیکی( اینماد ) در سایت| قابلیت کدکوتاه و ابزارک برای ای نماد | شامد | نماد های دیگر
Is Logo Manager For Enamad Safe to Use in 2026?
Generally Safe
Score 91/100Logo Manager For Enamad has a strong security track record. Known vulnerabilities have been patched promptly.
The "logo-manager-for-enamad" plugin v0.7.4 exhibits a mixed security posture. On the positive side, the code analysis reveals good practices such as 100% of SQL queries using prepared statements and the absence of file operations or external HTTP requests. Nonce checks are present, which is a positive sign for security. However, a significant concern is the low percentage of properly escaped output (61%), indicating a potential risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's vulnerability history. The lack of capability checks for any entry points, though the static analysis reports 0 unprotected entry points, warrants further investigation as capability checks are crucial for securing administrative functions.
The vulnerability history is a key area of concern. The plugin has a history of two medium-severity CVEs, specifically related to Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). The fact that these vulnerabilities, though not currently unpatched, have existed suggests a pattern of past security weaknesses. The most recent vulnerability was on August 27, 2024, which is very recent and highlights an ongoing security challenge.
In conclusion, while the plugin demonstrates some good coding practices like prepared SQL statements, the high proportion of unescaped output and the history of XSS and CSRF vulnerabilities are significant weaknesses. The lack of explicit capability checks on entry points, even if static analysis shows them as protected, remains a point of caution. Users should be aware of the potential for XSS and CSRF if the unescaped output vulnerabilities are not thoroughly addressed.
Key Concerns
- Medium severity CVEs in vulnerability history
- Significant portion of output not properly escaped
- Recent vulnerability reported
Logo Manager For Enamad Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Logo Manager For Enamad <= 0.7.2 - Authenticated (Admin+) Stored Cross-Site Scripting
Logo Manager For Enamad <= 0.7.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Logo Manager For Enamad Code Analysis
Output Escaping
Logo Manager For Enamad Attack Surface
Shortcodes 3
WordPress Hooks 9
Maintenance & Trust
Logo Manager For Enamad Maintenance & Trust
Maintenance Signals
Community Trust
Logo Manager For Enamad Alternatives
Logo Manager For Enamad Developer Profile
7 plugins · 8K total installs
How We Detect Logo Manager For Enamad
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/logo-manager-for-enamad/css/enamadlogo.css/wp-content/plugins/logo-manager-for-enamad/js/enamadlogo.js/wp-content/plugins/logo-manager-for-enamad/js/enamadlogo.jslogo-manager-for-enamad/css/enamadlogo.css?ver=logo-manager-for-enamad/js/enamadlogo.js?ver=HTML / DOM Fingerprints
enamad-logo-widget<!--No script kiddies please!-->name="enamad-enable"name="enamad-disable-mobile"name="enamad-replace-with-img"name="enamad-width"name="enamad-position"name="enamad-view-method"+6 more