
Lord Linus Online Visitor Widget Security & Risk Analysis
wordpress.org/plugins/lord-linus-online-visitorLord Linus Online Visitor Plugin show the total number of Online users showing at the moment Besides that you can show the IP address of the users too …
Is Lord Linus Online Visitor Widget Safe to Use in 2026?
Generally Safe
Score 100/100Lord Linus Online Visitor Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The security posture of the 'lord-linus-online-visitor' plugin version 1.2 exhibits a mixed bag of good practices and significant concerns. On the positive side, the plugin demonstrates a complete lack of known CVEs and a small attack surface with no apparent entry points from AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication. All detected SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are generally good indicators of secure coding. However, the analysis reveals critical weaknesses.
The presence of the `create_function` dangerous function is a red flag, as it can be exploited for code injection under certain circumstances. More concerning are the taint analysis results, which indicate two flows with unsanitized paths. While classified as not critical or high severity, the mere existence of unsanitized paths suggests a potential for attackers to inject malicious data that might be processed without proper validation, leading to unexpected behavior or even vulnerabilities.
Furthermore, the plugin fails entirely on output escaping, with 0% of its 10 detected outputs being properly escaped. This is a critical security flaw that makes the plugin highly susceptible to Cross-Site Scripting (XSS) attacks. Attackers could inject malicious scripts into user inputs that are later displayed on the frontend or backend without sanitization, compromising user sessions or defacing the website.
In conclusion, despite a clean vulnerability history and a well-contained attack surface, the 'lord-linus-online-visitor' plugin has severe security shortcomings related to output escaping and potential unsanitized data flows. The use of `create_function` adds another layer of risk. These issues significantly outweigh the positive aspects, making the plugin a high-risk component if deployed.
Key Concerns
- 0% properly escaped output
- Flows with unsanitized paths found
- Dangerous function detected: create_function
- No nonce checks
- No capability checks
Lord Linus Online Visitor Widget Security Vulnerabilities
Lord Linus Online Visitor Widget Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Lord Linus Online Visitor Widget Attack Surface
WordPress Hooks 3
Maintenance & Trust
Lord Linus Online Visitor Widget Maintenance & Trust
Maintenance Signals
Community Trust
Lord Linus Online Visitor Widget Alternatives
No alternatives data available yet.
Lord Linus Online Visitor Widget Developer Profile
2 plugins · 20 total installs
How We Detect Lord Linus Online Visitor Widget
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/lord-linus-online-visitor/menu-pages/setting.php/wp-content/plugins/lord-linus-online-visitor/menu-pages/uninstall.php/wp-content/plugins/lord-linus-online-visitor/install-script.php/wp-content/plugins/lord-linus-online-visitor/languages/HTML / DOM Fingerprints
LordlinusOnlineVid="LordlinusOnlineV"<h3 class='widget-title'>