MyCitySelector Security & Risk Analysis

wordpress.org/plugins/mycityselector

MyCitySelector plugin for WordPress. Detect user location, substitute any data depending on user location and much more...

0 active installs v0.0.5 PHP 7.4+ WP 5.8+ Updated Feb 1, 2022
citycountrylocationregionstate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MyCitySelector Safe to Use in 2026?

Generally Safe

Score 85/100

MyCitySelector has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "mycityselector" v0.0.5 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, dangerous functions, or taint flows with unsanitized paths is highly commendable. Furthermore, the plugin demonstrates excellent adherence to secure coding practices with 100% of SQL queries using prepared statements and all output properly escaped. The vulnerability history is also clean, with no recorded CVEs, which suggests a history of secure development or effective security patching. The presence of capability checks also indicates a consideration for access control.

Despite the overwhelmingly positive findings, a potential area of concern is the complete absence of nonce checks. While there are no unprotected entry points identified, nonce checks are a crucial layer of defense against Cross-Site Request Forgery (CSRF) attacks, especially for any administrative or user-facing actions that might be introduced in future versions or are handled implicitly. The single file operation, while not inherently risky, warrants careful scrutiny in any deeper review to ensure it doesn't introduce vulnerabilities if it involves user-supplied data or sensitive file paths.

In conclusion, "mycityselector" v0.0.5 appears to be a securely developed plugin. Its strengths lie in its clean code signals, absence of known vulnerabilities, and good use of prepared statements and output escaping. The primary area for improvement, and a potential minor risk, is the lack of nonce checks, which should be considered for future development to bolster its defenses against CSRF.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

MyCitySelector Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MyCitySelector Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
40 prepared
Unescaped Output
0
29 escaped
Nonce Checks
0
Capability Checks
6
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

95% prepared42 total queries

Output Escaping

100% escaped29 total outputs
Attack Surface

MyCitySelector Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
filterprint_styles_arrayhooks.php:114
filterdo_parse_requesthooks.php:130
filterhome_urlhooks.php:131
actionadmin_menumcs.php:34
actioninitmcs.php:35
actionrest_api_initmcs.php:36
actionadmin_enqueue_scriptsmcs.php:37
actionadmin_initmcs.php:38
actionwidgets_initmcs.php:41
Maintenance & Trust

MyCitySelector Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedFeb 1, 2022
PHP min version7.4
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

MyCitySelector Developer Profile

Vladislav Smolensky

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MyCitySelector

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mycityselector/widget/build/index.js/wp-content/plugins/mycityselector/admin/build/index.js

HTML / DOM Fingerprints

CSS Classes
mcs-admin-root
JS Globals
wpApiSettings
REST Endpoints
/wp-json/mcs/
FAQ

Frequently Asked Questions about MyCitySelector