Author: Munzir Security & Risk Analysis

wordpress.org/plugins/myshouts-shoutbox

A simple shoutbox with accordion option and customizable through admin panel.

50 active installs v0.9 PHP + WP 3+ Updated Sep 26, 2013
ajaxchatshoutboxsimple
63
C · Use Caution
CVEs total1
Unpatched1
Last CVESep 19, 2025
Safety Verdict

Is Author: Munzir Safe to Use in 2026?

Use With Caution

Score 63/100

Author: Munzir has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Sep 19, 2025Updated 12yr ago
Risk Assessment

The "myshouts-shoutbox" v0.9 plugin presents a significant security risk due to several concerning indicators in its static analysis and a known vulnerability. While the plugin has a seemingly small attack surface with no direct AJAX, REST API, shortcode, or cron event entry points exposed without authentication, the code signals reveal critical weaknesses. The presence of the `unserialize` function is a major red flag, as it can be exploited if attackers can control the data being unserialized, potentially leading to remote code execution. Furthermore, a very low percentage of SQL queries use prepared statements, increasing the risk of SQL injection vulnerabilities. The extremely low rate of proper output escaping (2%) suggests a high likelihood of Cross-Site Scripting (XSS) vulnerabilities across many output points.

Taint analysis reveals that all analyzed flows have unsanitized paths, with six flows identified as high severity. This, combined with the historical data showing one medium severity CVE for XSS and the fact that this vulnerability remains unpatched, strongly indicates a pattern of insecure coding practices. The plugin has a history of XSS vulnerabilities, and the current analysis suggests that similar vulnerabilities are likely present and unaddressed. The complete lack of nonce and capability checks further exacerbates these risks, as there are no built-in mechanisms to verify user authorization or prevent CSRF attacks.

In conclusion, while the plugin's attack surface appears limited in terms of traditional entry points, the internal code quality is severely lacking. The combination of dangerous functions, unescaped output, insecure SQL queries, a high number of unsanitized taint flows, and a persistent, unpatched XSS vulnerability makes this plugin a high-risk component. The absence of essential security checks like nonces and capability checks compounds these issues, leaving any website using this plugin vulnerable to significant security threats.

Key Concerns

  • Unpatched CVE
  • Dangerous function: unserialize
  • High severity taint flows
  • Low percentage of prepared SQL statements
  • Very low rate of proper output escaping
  • No nonce checks
  • No capability checks
  • All flows have unsanitized paths
Vulnerabilities
1

Author: Munzir Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-58916medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Author: Munzir <= 0.9 - Reflected Cross-Site Scripting

Sep 19, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

Author: Munzir Code Analysis

Dangerous Functions
2
Raw SQL Queries
10
4 prepared
Unescaped Output
44
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$Styles = unserialize(get_option('myshouts_styles'));myshouts.php:203
unserialize$Styles = unserialize(get_option('myshouts_styles'));myshouts.php:625

SQL Query Safety

29% prepared14 total queries

Output Escaping

2% escaped45 total outputs
Data Flows
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
myshouts_headstuff (myshouts.php:121)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Author: Munzir Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actioninitmyshouts.php:27
actionadmin_menumyshouts.php:28
actionwp_headmyshouts.php:29
actionwidgets_initmyshouts.php:391
Maintenance & Trust

Author: Munzir Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 26, 2013
PHP min version
Downloads25K

Community Trust

Rating100/100
Number of ratings2
Active installs50
Developer Profile

Author: Munzir Developer Profile

Munzir

1 plugin · 50 total installs

68
trust score
Avg Security Score
63/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Author: Munzir

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/myshouts-shoutbox/myshouts.css/wp-content/plugins/myshouts-shoutbox/shout.js
Script Paths
/wp-content/plugins/myshouts-shoutbox/shout.js
Version Parameters
myshouts-shoutbox/myshouts.css?ver=myshouts-shoutbox/shout.js?ver=

HTML / DOM Fingerprints

CSS Classes
theshoutsmyshouts_titleinputtextnameemailwebsite
HTML Comments
wrapper
Data Attributes
data-options
JS Globals
post_filemyshouts_check_stream
Shortcode Output
<div id="myshouts_wrapper"<div id="myshouts_shouts" class="theshouts"<form name="myshouts_form" id="myshouts_form"<input type="hidden" value="
FAQ

Frequently Asked Questions about Author: Munzir