Moody Weather Security & Risk Analysis

wordpress.org/plugins/moody-weather

Displays a mood and icon based on the current weather conditions using data from OpenWeatherMap.

10 active installs v1.4.0 PHP + WP 5.7+ Updated Feb 3, 2025
forecastmoodopenweathermapweather
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Moody Weather Safe to Use in 2026?

Generally Safe

Score 92/100

Moody Weather has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "moody-weather" v1.4.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, file operations, and SQL queries using prepared statements are positive indicators. Furthermore, the plugin has no recorded vulnerability history, which suggests consistent secure development practices or a lack of prior discovery of issues.

However, several areas warrant caution. The plugin lacks nonce checks and capability checks for its entry points, including a shortcode. While the attack surface is small (one shortcode), the absence of these fundamental security measures means that an attacker could potentially trigger the shortcode's functionality without proper authentication or authorization. Additionally, 16% of output isn't properly escaped, which could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully within the shortcode's output. The single external HTTP request, while not inherently a risk, is an area to monitor as it could be a vector for further attacks if not implemented securely.

Overall, the plugin is built on a foundation of good practices, but the missing authentication and authorization checks on its shortcode, coupled with some unescaped output, represent specific vulnerabilities that need to be addressed to achieve a robust security profile.

Key Concerns

  • Missing nonce check on entry points
  • Missing capability check on entry points
  • Unescaped output found
Vulnerabilities
None known

Moody Weather Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Moody Weather Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

84% escaped25 total outputs
Attack Surface

Moody Weather Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[moody_weather] moody-weather.php:228
WordPress Hooks 4
actionadmin_enqueue_scriptsmoody-weather.php:54
actionwp_enqueue_scriptsmoody-weather.php:80
actionadmin_menumoody-weather.php:92
actionadmin_initmoody-weather.php:123
Maintenance & Trust

Moody Weather Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedFeb 3, 2025
PHP min version
Downloads748

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Moody Weather Developer Profile

devifypro

1 plugin · 10 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Moody Weather

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/moody-weather/style.css/wp-content/plugins/moody-weather/css/spectrum.css/wp-content/plugins/moody-weather/js/spectrum.js
Script Paths
/wp-content/plugins/moody-weather/js/spectrum.js
Version Parameters
moody-weather/style.css?ver=moody-weather/css/spectrum.css?ver=moody-weather/js/spectrum.js?ver=

HTML / DOM Fingerprints

CSS Classes
moody-weatherweather-icon
Data Attributes
id="background_color"id="text_color"id="accent_color"id="icon_color"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Moody Weather