Monage Security & Risk Analysis

wordpress.org/plugins/monage

Let\'s make monage (giving monacoin) to wordpress blog more easier!

10 active installs v1.46 PHP 5.3+ WP 4.7+ Updated Jan 22, 2018
crypto-currencymonamonacoinvirtual-currency%e4%bb%ae%e6%83%b3%e9%80%9a%e8%b2%a8
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Monage Safe to Use in 2026?

Generally Safe

Score 85/100

Monage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'monage' plugin v1.46 exhibits a generally strong security posture based on the static analysis provided. There are no identified dangerous functions, all SQL queries utilize prepared statements, and all identified outputs are properly escaped. The absence of file operations and external HTTP requests further reduces the potential attack surface. However, the presence of unsanitized paths in two taint flows, despite the lack of critical or high severity, warrants attention as it indicates potential pathways for malicious input to reach sensitive operations, even if not currently exploited or leading to severe outcomes.

The plugin has no recorded vulnerability history, including CVEs, which is a significant positive indicator. This lack of past issues, combined with good coding practices observed in the static analysis, suggests a commitment to security by the developers. Nonetheless, the identified taint flows represent a weakness that could be exploited if a vulnerability is introduced in the future or if these paths are leveraged in conjunction with other system weaknesses. The absence of nonce and capability checks on the identified entry points (shortcodes) is also a concern, as it means these shortcodes could be triggered by unauthenticated users, potentially leading to unexpected behavior or information leakage if the shortcode's internal logic is not robustly secured.

Key Concerns

  • Taint flows with unsanitized paths
  • No nonce checks on shortcodes
  • No capability checks on shortcodes
Vulnerabilities
None known

Monage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Monage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
monage_options_page (monage.php:135)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Monage Attack Surface

Entry Points6
Unprotected0

Shortcodes 6

[monage_twid] monage.php:109
[monage_imgloc] monage.php:110
[monage_picwi] monage.php:111
[monage_default_mona] monage.php:112
[monage_bf] monage.php:113
[monage_af] monage.php:114
WordPress Hooks 3
actionadmin_menumonage.php:116
actionadmin_noticesmonage.php:171
filterthe_contentmonage.php:257
Maintenance & Trust

Monage Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 22, 2018
PHP min version5.3
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Monage Developer Profile

raspi0124

2 plugins · 10K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Monage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/monage/monage.png

HTML / DOM Fingerprints

CSS Classes
monage_1
Shortcode Output
[monage_twid][monage_imgloc][monage_picwi][monage_default_mona]
FAQ

Frequently Asked Questions about Monage