Mandegar Feed Security & Risk Analysis

wordpress.org/plugins/mandegar-feed

Show valuable posts of Mandegarweb in your dashboard

10 active installs v1.0 PHP + WP 3.6+ Updated Oct 31, 2014
admin-font-editorfeedmandegar-feedmandegarwebmandegarweb-feedparsi
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mandegar Feed Safe to Use in 2026?

Generally Safe

Score 85/100

Mandegar Feed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "mandegar-feed" v1.0 plugin exhibits a strong initial security posture based on the provided static analysis. The absence of any identified attack surface (AJAX handlers, REST API routes, shortcodes, cron events) significantly reduces the potential for external manipulation. Furthermore, the code signals reveal no dangerous functions, no raw SQL queries (all are prepared), no file operations, and no external HTTP requests, all of which are excellent security practices. The lack of vulnerability history also suggests a clean track record, implying the developers have either been diligent in their security practices or the plugin has not been subjected to extensive public scrutiny or attacks.

However, the analysis does highlight a significant concern: 100% of the single output identified is not properly escaped. This is a critical weakness as it opens the door to Cross-Site Scripting (XSS) vulnerabilities. Any data outputted by the plugin without proper sanitization can be manipulated by an attacker to inject malicious scripts into the user's browser, leading to session hijacking, defacement, or redirection to malicious sites. The absence of nonce and capability checks, while potentially understandable given the zero attack surface, means that if any entry points were to be inadvertently introduced in future versions, they might lack crucial authorization and integrity checks.

In conclusion, while "mandegar-feed" v1.0 demonstrates a commendably secure foundation by minimizing its attack surface and avoiding common pitfalls like raw SQL or dangerous functions, the unescaped output represents a critical vulnerability. The clean vulnerability history is a positive sign, but it should not lead to complacency. The developers must address the output escaping issue to mitigate the XSS risk. The lack of explicit authentication and authorization checks, though not currently exploitable due to the zero attack surface, could become a concern if the plugin evolves.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

Mandegar Feed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Mandegar Feed Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Mandegar Feed Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Mandegar Feed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_dashboard_setupmandegar-feed.php:18
actioninitmandegar-feed.php:36
Maintenance & Trust

Mandegar Feed Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedOct 31, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Mandegar Feed Developer Profile

Ghaem

2 plugins · 9K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
2842 days
View full developer profile
Detection Fingerprints

How We Detect Mandegar Feed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
mandegarfeed
FAQ

Frequently Asked Questions about Mandegar Feed