Meta Fetcher Security & Risk Analysis

wordpress.org/plugins/meta-fetcher

This plugin provides a simple [meta] shortcode that allows you to fetch meta information for the current $post.

10 active installs v0.4 PHP + WP 3.0.0+ Updated Dec 8, 2015
metapostshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Meta Fetcher Safe to Use in 2026?

Generally Safe

Score 85/100

Meta Fetcher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The meta-fetcher plugin v0.4 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and the absence of any recorded vulnerabilities in its history are all positive indicators. The plugin also demonstrates good practices by not bundling external libraries and by not exposing critical functionalities through AJAX or REST API endpoints without proper checks. Taint analysis results are also clean, suggesting no immediate exploitable data flow issues.

However, a key concern arises from the complete lack of capability checks and nonce checks across all entry points. While the attack surface is currently small (one shortcode), this lack of robust authorization and CSRF protection means that any future expansion of functionality, or even the existing shortcode, could be vulnerable if an attacker can trick a logged-in user into triggering it. The absence of nonce checks is particularly concerning for shortcodes, which are often used to render content that might interact with the backend.

In conclusion, meta-fetcher v0.4 is well-coded in terms of preventing common vulnerabilities like SQL injection and XSS. Its vulnerability history is nonexistent, which is excellent. The primary weakness lies in the underdeveloped authorization and CSRF protection mechanisms for its single entry point. While not currently critical due to the limited attack surface, this represents a significant potential risk that should be addressed.

Key Concerns

  • Missing capability checks on entry points
  • Missing nonce checks on entry points
Vulnerabilities
None known

Meta Fetcher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Meta Fetcher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Meta Fetcher Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[meta] meta-fetcher.php:82
Maintenance & Trust

Meta Fetcher Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.0
Last updatedDec 8, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Meta Fetcher Developer Profile

webdeveric

4 plugins · 330 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Meta Fetcher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[meta name="some_name_here" default="some default content"]
FAQ

Frequently Asked Questions about Meta Fetcher