
Mantenimiento web Security & Risk Analysis
wordpress.org/plugins/mantenimiento-webEste plugin permite poner tu página en modo mantenimiento con el típico mensaje "Página en construcción" o "Página en mantenimiento&quo …
Is Mantenimiento web Safe to Use in 2026?
Generally Safe
Score 99/100Mantenimiento web has a strong security track record. Known vulnerabilities have been patched promptly.
The plugin "mantenimiento-web" v0.14 exhibits a mixed security posture. On the positive side, the static analysis indicates no identified dangerous functions, file operations, external HTTP requests, or vulnerabilities through taint analysis. The use of prepared statements for all SQL queries is also a strong positive. However, a significant concern is the extremely low percentage of properly escaped output (12%), suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's vulnerability history. The absence of any identified capability checks or nonce checks on potential entry points, while the attack surface is reported as zero, is also noteworthy and could indicate an incomplete analysis or a design that relies entirely on WordPress core for security, which is not always sufficient.
The vulnerability history reveals two medium-severity CVEs, primarily related to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS). The fact that these are not currently unpatched is good, but the pattern of these vulnerability types, combined with the static analysis's output escaping issues, strongly points to an ongoing risk of XSS. The presence of an outdated bundled library, jQuery v1.7.1, also poses a potential risk for known vulnerabilities that may not have been discovered by the provided analysis.
In conclusion, while the plugin avoids some common pitfalls like raw SQL and dangerous functions, the severe lack of output escaping is a major weakness. This, coupled with the history of XSS and CSRF vulnerabilities and the outdated bundled library, means the plugin's security is not robust. Developers should prioritize addressing the output escaping issues and consider updating bundled libraries to mitigate identified risks.
Key Concerns
- Low output escaping percentage (12%)
- Bundled outdated library: jQuery v1.7.1
- History of 2 medium severity CVEs (CSRF, XSS)
- Zero capability checks
- Zero nonce checks
Mantenimiento web Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Mantenimiento web <= 0.8 - Cross-Site Request Forgery
Mantenimiento web <= 0.13 - Authenticated (Administrator+) Stored Cross-Site Scripting
Mantenimiento web Code Analysis
Bundled Libraries
Output Escaping
Mantenimiento web Attack Surface
WordPress Hooks 2
Maintenance & Trust
Mantenimiento web Maintenance & Trust
Maintenance Signals
Community Trust
Mantenimiento web Alternatives
Mantenimiento web Developer Profile
3 plugins · 40K total installs
How We Detect Mantenimiento web
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/mantenimiento-web/css/mantenimiento-web.css/wp-content/plugins/mantenimiento-web/js/mantenimiento-web.js/wp-content/plugins/mantenimiento-web/js/mantenimiento-web.jsmantenimiento-web/css/mantenimiento-web.css?ver=mantenimiento-web/js/mantenimiento-web.js?ver=HTML / DOM Fingerprints
cdp-contenedor-ppalcdp-contenidocdp-textofondo1fondo2fondo3<!-- cdp_mantenimiento_web -->