Mourning Security & Risk Analysis

wordpress.org/plugins/mourning

Add black ribbon and grey out the website

200 active installs v1.0.3 PHP + WP 3.0.1+ Updated Aug 4, 2020
condolencegrayscalegreymourningremembrance
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mourning Safe to Use in 2026?

Generally Safe

Score 85/100

Mourning has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The 'mourning' plugin v1.0.3 exhibits a strong security posture based on the provided static analysis and vulnerability history. The complete absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events, along with zero unprotected entry points, significantly limits the plugin's attack surface. Furthermore, the code signals are highly encouraging: no dangerous functions, all SQL queries use prepared statements, and all identified outputs are properly escaped. The lack of file operations and external HTTP requests also contributes positively to its security.

The absence of any recorded vulnerabilities, CVEs, or taint flows with unsanitized paths is a significant strength. This suggests a well-developed plugin with a focus on security best practices. However, it's important to note that the static analysis found zero nonce checks and zero capability checks. While this might be acceptable if the plugin has no user-facing or sensitive operations, it represents a potential weakness if its functionality evolves or if there are implicit assumptions about user authorization that are not explicitly checked.

In conclusion, the 'mourning' plugin v1.0.3 appears very secure due to its minimal attack surface, clean code signals, and clean vulnerability history. The primary area of potential concern, albeit not immediately exploitable based on the current analysis, is the complete lack of explicit nonce and capability checks, which could become a vulnerability if the plugin's functionality expands to include sensitive operations.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Mourning Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mourning Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Mourning Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menumourning.php:48
actionadmin_initmourning.php:49
filterplugin_action_linksmourning.php:52
actionwp_enqueue_scriptsmourning.php:55
actionwp_footermourning.php:56
Maintenance & Trust

Mourning Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedAug 4, 2020
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

Mourning Developer Profile

jojoee

6 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mourning

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mourning/css/main.css
Version Parameters
mourning/css/main.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Mourning