
MWS Click-to-reveal Security & Risk Analysis
wordpress.org/plugins/mws-click-to-revealPrevent spam-bots from harvesting your email address or other sensitive information form your website by requiring users to click to reveal the inform …
Is MWS Click-to-reveal Safe to Use in 2026?
Generally Safe
Score 85/100MWS Click-to-reveal has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "mws-click-to-reveal" plugin v1.0.3 presents a generally good security posture with no known historical vulnerabilities and a seemingly limited attack surface. The absence of CVEs and the plugin's focus on prepared statements for SQL queries are positive indicators. However, there are notable concerns regarding output escaping, with only 13% of outputs being properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without sufficient sanitization. While taint analysis shows no critical or high-severity flows, the limited scope of this analysis (0 flows analyzed) means it's not a definitive guarantee of safety. The presence of a bundled library (TinyMCE) also introduces a potential risk if it's outdated and unpatched, though no specific version information is provided to assess this.
Overall, the plugin demonstrates good practices in areas like SQL querying and the absence of historical vulnerabilities. The primary weakness lies in the insufficient output escaping, which requires immediate attention to mitigate XSS risks. The limited taint analysis and lack of specific versioning for bundled libraries mean that further investigation may be warranted. The plugin's strengths lie in its minimal attack surface and SQL security, but the output escaping issue is a significant vulnerability that must be addressed.
Key Concerns
- Insufficient output escaping (13% escaped)
- Bundled library (TinyMCE) without version info
MWS Click-to-reveal Security Vulnerabilities
MWS Click-to-reveal Code Analysis
Bundled Libraries
Output Escaping
MWS Click-to-reveal Attack Surface
WordPress Hooks 11
Maintenance & Trust
MWS Click-to-reveal Maintenance & Trust
Maintenance Signals
Community Trust
MWS Click-to-reveal Alternatives
No alternatives data available yet.
MWS Click-to-reveal Developer Profile
2 plugins · 300 total installs
How We Detect MWS Click-to-reveal
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/mws-click-to-reveal/src/js/admin/tinymce-plugin.jsmws-click-to-reveal/style.css?ver=HTML / DOM Fingerprints
mws_ctr_protected_value_names