Mi librería Security & Risk Analysis

wordpress.org/plugins/mi-libreria

Mi librería te permite añadir automáticamente a los artículos de tu blog una selección de los mejores libros sobre el tema de tu artículo

10 active installs v1.3 PHP + WP 4.0+ Updated Jan 6, 2016
bibliotecalectorlibrerialibrolibros
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mi librería Safe to Use in 2026?

Generally Safe

Score 85/100

Mi librería has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "mi-libreria" v1.3 plugin exhibits several concerning security weaknesses despite its clean vulnerability history. A significant portion of its attack surface, specifically 5 out of 6 entry points, lacks authentication checks. This means that any user, including unauthenticated ones, could potentially interact with these unprotected AJAX handlers. Furthermore, the code analysis revealed a critical vulnerability in the use of the `create_function` PHP function, which is known to be insecure and can lead to arbitrary code execution if user input is passed to it without proper sanitization. While SQL queries are properly prepared and there are no identified critical or high severity taint flows, the lack of output escaping on a substantial percentage of outputs (68%) indicates a risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce checks on AJAX handlers is another critical oversight that exposes the plugin to CSRF attacks.

Despite the lack of recorded CVEs, which is a positive sign, it does not negate the immediate risks identified in the static analysis. The plugin's current state suggests a general lack of robust security implementation. The presence of dangerous functions, unprotected entry points, and insufficient output escaping creates a fertile ground for exploitation. While the SQL query handling is commendable, it is overshadowed by other critical vulnerabilities. The plugin requires immediate attention to address the identified security flaws to mitigate potential risks to WordPress sites.

In conclusion, "mi-libreria" v1.3 has a weak security posture due to numerous unprotected entry points and the use of a dangerous function. The lack of output escaping and nonce checks further exacerbates these risks, making it vulnerable to XSS and CSRF attacks. While the absence of recorded vulnerabilities is a positive, it is overshadowed by the critical issues found in the static analysis. Immediate remediation is strongly recommended.

Key Concerns

  • AJAX handlers without auth checks
  • Dangerous function: create_function
  • Output escaping: 68% not properly escaped
  • Nonce checks: 0
  • Capability checks: 1 (likely insufficient)
  • Unsanitized paths in taint flows
Vulnerabilities
None known

Mi librería Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Mi librería Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
25
12 escaped
Nonce Checks
0
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("wp_prh_ml");'));inc\prh-ml-admin.php:61

Output Escaping

32% escaped37 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
prh_ml_get_books_markup (inc\prh-ml-front-ajax.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
5 unprotected

Mi librería Attack Surface

Entry Points6
Unprotected5

AJAX Handlers 5

noprivwp_ajax_prh-ml-get-books-markupinc\prh-ml-front-ajax.php:15
authwp_ajax_prh-ml-get-books-markupinc\prh-ml-front-ajax.php:16
authwp_ajax_prh-ml-metabox-get-booksinc\prh-ml-metabox-ajax.php:14
authwp_ajax_prh-ml-metabox-save-selectioninc\prh-ml-metabox-ajax.php:67
authwp_ajax_prh-ml-metabox-save-displayinc\prh-ml-metabox-ajax.php:95

Shortcodes 1

[mi-libreria] inc\prh-ml-admin.php:76
WordPress Hooks 9
actionadmin_noticesinc\prh-ml-admin.php:13
actionadmin_enqueue_scriptsinc\prh-ml-admin.php:25
actionwidgets_initinc\prh-ml-admin.php:61
actiontemplate_redirectinc\prh-ml-front.php:15
filterthe_contentinc\prh-ml-front.php:29
actionadmin_initinc\prh-ml-metabox.php:14
actionadd_meta_boxesinc\prh-ml-metabox.php:19
actionadmin_initinc\prh-ml-options.php:12
actionadmin_menuinc\prh-ml-options.php:28
Maintenance & Trust

Mi librería Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 6, 2016
PHP min version
Downloads3K

Community Trust

Rating70/100
Number of ratings2
Active installs10
Developer Profile

Mi librería Developer Profile

Yes We Work

3 plugins · 380 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
12 days
View full developer profile
Detection Fingerprints

How We Detect Mi librería

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mi-libreria/css/prh-ml-metabox.css/wp-content/plugins/mi-libreria/js/prh-ml-metabox.js/wp-content/plugins/mi-libreria/css/prh-ml-options.css/wp-content/plugins/mi-libreria/js/prh-ml-options.js/wp-content/plugins/mi-libreria/css/prh-ml-front.css/wp-content/plugins/mi-libreria/js/prh-ml-front.js
Script Paths
/wp-content/plugins/mi-libreria/js/prh-ml-metabox.js/wp-content/plugins/mi-libreria/js/prh-ml-options.js/wp-content/plugins/mi-libreria/js/prh-ml-front.js

HTML / DOM Fingerprints

CSS Classes
prh_ml_containerprh_ml_bookprh_ml_book_containerprh_ml_coverprh_ml_title
Data Attributes
data-pid
JS Globals
prh_ml_ajax
REST Endpoints
wp-admin/admin-ajax.php
Shortcode Output
<div data-pid="
FAQ

Frequently Asked Questions about Mi librería