Monster Пульс Security & Risk Analysis

wordpress.org/plugins/monster-pulse

Добавляет RSS-ленту для рекомендательной системы Mail.Ru – Пульс

70 active installs v1.2.2 PHP + WP 3.6+ Updated Feb 21, 2019
%d0%bb%d0%b5%d0%bd%d1%82%d0%b0%d0%bf%d1%83%d0%bb%d1%8c%d1%81mail-rupulserss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Monster Пульс Safe to Use in 2026?

Generally Safe

Score 85/100

Monster Пульс has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "monster-pulse" v1.2.2 plugin exhibits a generally good security posture based on the provided static analysis. It has no recorded vulnerabilities, a clean history, and the code demonstrates good practices like using prepared statements for all SQL queries and implementing nonce and capability checks. The absence of a large attack surface and file operations further contributes to its perceived security.

However, there are areas of concern. The significantly low percentage of properly escaped output (31%) represents a potential risk for Cross-Site Scripting (XSS) vulnerabilities. While the taint analysis did not flag critical or high-severity issues, the presence of a "flow with unsanitized paths" suggests that some data processing might not be adequately secured, which could be exploited if a vulnerable entry point were discovered or introduced.

In conclusion, "monster-pulse" v1.2.2 has a solid foundation with its SQL handling and authentication checks. The primary weakness lies in output escaping. The lack of historical vulnerabilities is positive but doesn't negate the risks identified in the static analysis, particularly the unescaped output and the single unsanitized path flow. Ongoing vigilance and remediation of the output escaping are recommended.

Key Concerns

  • Low percentage of properly escaped output
  • Flow with unsanitized paths found
Vulnerabilities
None known

Monster Пульс Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Monster Пульс Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
11
5 escaped
Nonce Checks
3
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

31% escaped16 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
monsterpulse_rss (functions.php:176)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Monster Пульс Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitfunctions.php:14
actionadmin_menufunctions.php:17
actionadd_meta_boxesfunctions.php:132
actionsave_postfunctions.php:155
Maintenance & Trust

Monster Пульс Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedFeb 21, 2019
PHP min version
Downloads2K

Community Trust

Rating86/100
Number of ratings6
Active installs70
Developer Profile

Monster Пульс Developer Profile

Vladislav Moshikov

3 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Monster Пульс

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Monster Пульс