
MemorialDay Security & Risk Analysis
wordpress.org/plugins/memorialday「特殊节日使用」在国家公祭日、全国哀悼日时网站增加灰色滤镜
Is MemorialDay Safe to Use in 2026?
Generally Safe
Score 99/100MemorialDay has a strong security track record. Known vulnerabilities have been patched promptly.
The "memorialday" plugin v1.1.0 demonstrates several positive security practices, including the absence of dangerous functions, all SQL queries utilizing prepared statements, and the presence of nonce and capability checks. The static analysis also indicates a complete lack of file operations and external HTTP requests, further contributing to a generally secure baseline. However, the plugin's attack surface is currently zero, which is unusual and might suggest it's a very simple plugin or that the static analysis tool might not be detecting all potential entry points if the plugin is not actively used or has no user-facing features.
Despite the clean code analysis, the plugin has a history of a medium-severity vulnerability, specifically Cross-Site Request Forgery (CSRF), with the last known vulnerability occurring relatively recently in February 2025. While this vulnerability is marked as currently unpatched, the fact that it's the *only* listed vulnerability and is not critical suggests a medium-term risk. The absence of critical taint flows and the high percentage of properly escaped output are strong points, but the single past CSRF vulnerability warrants attention, especially if it was not explicitly addressed in this version, even though the history states "currently unpatched: 0". This could indicate a discrepancy or that the vulnerability was fixed but the history hasn't updated fully.
In conclusion, the "memorialday" plugin v1.1.0 appears to be built with good security in mind, as evidenced by its clean code signals. The lack of detected entry points and dangerous functions is encouraging. The primary concern stems from its vulnerability history, particularly the medium-severity CSRF vulnerability. While the plugin is not currently unpatched, a past CSRF issue always suggests a potential risk if not rigorously addressed. The overall security posture is good, but vigilance regarding past vulnerabilities is advised.
Key Concerns
- Past medium severity vulnerability (CSRF)
MemorialDay Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
MemorialDay <= 1.0.4 - Cross-Site Request Forgery to Stored Cross-Site Scripting
MemorialDay Code Analysis
Output Escaping
MemorialDay Attack Surface
WordPress Hooks 3
Maintenance & Trust
MemorialDay Maintenance & Trust
Maintenance Signals
Community Trust
MemorialDay Alternatives
Mourning
mourning
Add black ribbon and grey out the website
WP Mourning
wp-mourning
A simple plugin to Gray out website showing the black ribbon to show mourning for your loved one.
WP Simple Mourning
wp-simple-mouring
Simple implementation of mourning in your page. Grey out your website.
Black Ribbon by Attawit
black-ribbon-by-attawit
Display mourning Black Ribbon at selected corner on every page of your website.
Paris Attacks Ribbon MC
paris-attacks-mc
Show support to Parisian and French people with a selected ribbon in your website corner. Configure the display via the Settings panel.
MemorialDay Developer Profile
13 plugins · 4K total installs
How We Detect MemorialDay
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
<style type='text/css'>html{ filter: grayscale(100%); -webkit-filter: grayscale(100%); -moz-filter: grayscale(100%); -ms-filter: grayscale(100%); -o-filter: grayscale(100%); filter: url('data:image/svg+xml;utf8,#grayscale'); filter:progid:DXImageTransform.Microsoft.BasicImage(grayscale=1); -webkit-filter: grayscale(1);}</style>