My Coderwall Badges Security & Risk Analysis

wordpress.org/plugins/my-coderwall-badges

gets your badges from coderwall website and let you show them on your blog.

10 active installs v0.6 PHP + WP 3.0+ Updated Apr 23, 2013
badgescoderwall
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is My Coderwall Badges Safe to Use in 2026?

Generally Safe

Score 85/100

My Coderwall Badges has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "my-coderwall-badges" v0.6 plugin exhibits a mixed security posture. On the positive side, it has no recorded vulnerabilities in its history, uses prepared statements for all SQL queries, and has a very small attack surface with no unprotected entry points identified in static analysis. Furthermore, it lacks dangerous functions and doesn't perform file operations or external HTTP requests without apparent checks.

However, significant concerns arise from the static analysis. The most pressing issue is that 100% of its output is unescaped, representing a critical security weakness that could lead to Cross-Site Scripting (XSS) vulnerabilities. While the taint analysis shows no critical or high severity flows, the presence of two flows with unsanitized paths is concerning, especially when coupled with the unescaped output. The lack of nonce checks on its single shortcode also presents an opportunity for potential abuse if the shortcode's functionality is sensitive or involves user input.

Despite the clean vulnerability history, the significant unescaped output and unsanitized paths in taint analysis indicate potential weaknesses that could be exploited. The plugin demonstrates good practices in areas like SQL query preparation and limited attack surface but falls short on essential output sanitization, which is a fundamental security control. A balanced view suggests that while the plugin hasn't been historically exploited, the identified code-level issues require immediate attention to prevent future vulnerabilities.

Key Concerns

  • Unescaped output
  • Flows with unsanitized paths
  • Lack of nonce checks
Vulnerabilities
None known

My Coderwall Badges Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

My Coderwall Badges Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped9 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
cwb_options (cw_badges.php:43)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

My Coderwall Badges Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[cwbadges] cw_badges.php:22
WordPress Hooks 4
actioninitcw_badges.php:11
actionwp_enqueue_scriptscw_badges.php:12
actionadmin_menucw_badges.php:13
actionplugins_loadedcw_badges.php:14
Maintenance & Trust

My Coderwall Badges Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedApr 23, 2013
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

My Coderwall Badges Developer Profile

wphostpk

4 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect My Coderwall Badges

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/my-coderwall-badges/css/style.css

HTML / DOM Fingerprints

CSS Classes
icon32
Data Attributes
id="cwusername"name="cwusername"id="cwendorse"name="cwendorse"
Shortcode Output
[cwbadges]
FAQ

Frequently Asked Questions about My Coderwall Badges