SMu Manual DoFollow Security & Risk Analysis

wordpress.org/plugins/manuall-dofollow

SMu DoFollow has many DoFollow Options (Manual or Automatism) and included URL Validator (Manual, WP-Cron or Cronjob).

100 active installs v1.8.1 PHP + WP 3.0.0+ Updated Dec 21, 2015
commentsdofollownofollowpingbacktrackback
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEJul 7, 2025
Safety Verdict

Is SMu Manual DoFollow Safe to Use in 2026?

Use With Caution

Score 63/100

SMu Manual DoFollow has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jul 7, 2025Updated 10yr ago
Risk Assessment

The "manuall-dofollow" v1.8.1 plugin presents a mixed security posture. While it boasts a zero attack surface from common entry points like AJAX, REST API, and shortcodes, indicating a potentially minimal direct exposure, significant concerns arise from its code analysis and vulnerability history. The complete lack of output escaping across all identified outputs is a critical flaw, exposing users to Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's history of such issues.

The taint analysis reveals three high-severity flows with unsanitized paths, directly pointing to potential injection vulnerabilities. Coupled with a notable percentage of SQL queries not using prepared statements, this suggests a susceptibility to SQL injection risks. The plugin also exhibits a concerning absence of nonce and capability checks, meaning that any functionality, if discovered, could be exploited without proper authorization.

Furthermore, the plugin has a history of at least one known CVE, which is currently unpatched and was a medium-severity XSS vulnerability. This pattern of XSS vulnerabilities, combined with the lack of escaping in the current version, indicates a recurring and unaddressed security weakness. The presence of file operations and external HTTP requests, while not inherently insecure, adds to the overall complexity and potential for unintended consequences when combined with other identified weaknesses.

In conclusion, while the plugin has a limited direct attack surface, the severe lack of output escaping, high-severity taint flows, potential for SQL injection, and history of unpatched XSS vulnerabilities paint a worrying picture. The absence of critical security measures like nonce and capability checks further exacerbates these risks. Users should exercise extreme caution, and the developers should prioritize addressing the fundamental security flaws in output handling and input validation.

Key Concerns

  • Unpatched CVE history
  • High severity taint flows (3)
  • No output escaping
  • SQL queries without prepared statements (84%)
  • No nonce checks
  • No capability checks
Vulnerabilities
1

SMu Manual DoFollow Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-49031medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

SMu Manual DoFollow <= 1.8.1 - Reflected Cross-Site Scripting

Jul 7, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

SMu Manual DoFollow Code Analysis

Dangerous Functions
0
Raw SQL Queries
21
4 prepared
Unescaped Output
65
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
9
External Requests
2
Bundled Libraries
0

SQL Query Safety

16% prepared25 total queries

Output Escaping

0% escaped65 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
smu_man_urlchk (manual_dofollow.php:81)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SMu Manual DoFollow Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
filterget_comment_author_linkmanual_dofollow.php:649
filtercomment_textmanual_dofollow.php:650
actionpreprocess_commentmanual_dofollow.php:651
actioncomment_formmanual_dofollow.php:652
actionadmin_menumanual_dofollow.php:655
filterplugin_action_linksmanual_dofollow.php:656
filtercomment_row_actionsmanual_dofollow.php:657
Maintenance & Trust

SMu Manual DoFollow Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 21, 2015
PHP min version
Downloads11K

Community Trust

Rating86/100
Number of ratings3
Active installs100
Developer Profile

SMu Manual DoFollow Developer Profile

Stefan M.

2 plugins · 110 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SMu Manual DoFollow

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/manuall-dofollow/css/style.css/wp-content/plugins/manuall-dofollow/js/smudofollow.js
Script Paths
/wp-content/plugins/manuall-dofollow/js/smudofollow.js
Version Parameters
manuall-dofollow/css/style.css?ver=manuall-dofollow/js/smudofollow.js?ver=

HTML / DOM Fingerprints

CSS Classes
misc-pub-section
JS Globals
jQuery
FAQ

Frequently Asked Questions about SMu Manual DoFollow