Mantenimiento web Security & Risk Analysis

wordpress.org/plugins/mantenimiento-web

Este plugin permite poner tu página en modo mantenimiento con el típico mensaje "Página en construcción" o "Página en mantenimiento&quo …

20K active installs v0.14 PHP + WP 3.5+ Updated Oct 8, 2025
mantenimiento-webmantenimiento-wordpressmodo-mantenimientopagina-en-construccion
99
A · Safe
CVEs total2
Unpatched0
Last CVEOct 31, 2022
Safety Verdict

Is Mantenimiento web Safe to Use in 2026?

Generally Safe

Score 99/100

Mantenimiento web has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Oct 31, 2022Updated 5mo ago
Risk Assessment

The plugin "mantenimiento-web" v0.14 exhibits a mixed security posture. On the positive side, the static analysis indicates no identified dangerous functions, file operations, external HTTP requests, or vulnerabilities through taint analysis. The use of prepared statements for all SQL queries is also a strong positive. However, a significant concern is the extremely low percentage of properly escaped output (12%), suggesting a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's vulnerability history. The absence of any identified capability checks or nonce checks on potential entry points, while the attack surface is reported as zero, is also noteworthy and could indicate an incomplete analysis or a design that relies entirely on WordPress core for security, which is not always sufficient.

The vulnerability history reveals two medium-severity CVEs, primarily related to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS). The fact that these are not currently unpatched is good, but the pattern of these vulnerability types, combined with the static analysis's output escaping issues, strongly points to an ongoing risk of XSS. The presence of an outdated bundled library, jQuery v1.7.1, also poses a potential risk for known vulnerabilities that may not have been discovered by the provided analysis.

In conclusion, while the plugin avoids some common pitfalls like raw SQL and dangerous functions, the severe lack of output escaping is a major weakness. This, coupled with the history of XSS and CSRF vulnerabilities and the outdated bundled library, means the plugin's security is not robust. Developers should prioritize addressing the output escaping issues and consider updating bundled libraries to mitigate identified risks.

Key Concerns

  • Low output escaping percentage (12%)
  • Bundled outdated library: jQuery v1.7.1
  • History of 2 medium severity CVEs (CSRF, XSS)
  • Zero capability checks
  • Zero nonce checks
Vulnerabilities
2

Mantenimiento web Security Vulnerabilities

CVEs by Year

2 CVEs in 2022
2022
Patched Has unpatched

Severity Breakdown

Medium
2

2 total CVEs

CVE-2022-38075medium · 6.1Cross-Site Request Forgery (CSRF)

Mantenimiento web <= 0.8 - Cross-Site Request Forgery

Oct 31, 2022 Patched in 0.9 (448d)
CVE-2022-41980medium · 5.5Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Mantenimiento web <= 0.13 - Authenticated (Administrator+) Stored Cross-Site Scripting

Oct 20, 2022 Patched in 0.14 (460d)
Code Analysis
Analyzed Mar 16, 2026

Mantenimiento web Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
29
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery1.7.1

Output Escaping

12% escaped33 total outputs
Attack Surface

Mantenimiento web Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actiontemplate_includemantenimiento-web.php:58
actionadmin_menumantenimiento-web.php:59
Maintenance & Trust

Mantenimiento web Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 8, 2025
PHP min version
Downloads295K

Community Trust

Rating100/100
Number of ratings5
Active installs20K
Developer Profile

Mantenimiento web Developer Profile

cdoral

3 plugins · 40K total installs

79
trust score
Avg Security Score
100/100
Avg Patch Time
454 days
View full developer profile
Detection Fingerprints

How We Detect Mantenimiento web

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mantenimiento-web/css/mantenimiento-web.css/wp-content/plugins/mantenimiento-web/js/mantenimiento-web.js
Script Paths
/wp-content/plugins/mantenimiento-web/js/mantenimiento-web.js
Version Parameters
mantenimiento-web/css/mantenimiento-web.css?ver=mantenimiento-web/js/mantenimiento-web.js?ver=

HTML / DOM Fingerprints

CSS Classes
cdp-contenedor-ppalcdp-contenidocdp-textofondo1fondo2fondo3
HTML Comments
<!-- cdp_mantenimiento_web -->
FAQ

Frequently Asked Questions about Mantenimiento web