Nevobo API Security & Risk Analysis

wordpress.org/plugins/nevobo-api

Show the results, fixtures and standings of a RSS Feeds from the Dutch Volleyball Federation (Nevobo) on your Wordpress website.

100 active installs v1.2.2 PHP 5.6+ WP 5.2+ Updated Apr 26, 2020
competitiefeednederlandsenevoborss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Nevobo API Safe to Use in 2026?

Generally Safe

Score 85/100

Nevobo API has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The nevobo-api plugin v1.2.2 exhibits a generally good security posture, with no known vulnerabilities recorded and a clean history. The static analysis shows an absence of dangerous functions and raw SQL queries. Notably, all SQL queries are prepared, and there are no file operations or external HTTP requests from the core functionality that might introduce risks. The presence of a nonce check and a single shortcode entry point (which appears to be protected based on the 'Unprotected: 0' metric) contribute positively to its security.

However, there are areas for improvement. The most significant concern is that 100% of the identified output points are not properly escaped. This represents a critical weakness, as it makes the plugin susceptible to Cross-Site Scripting (XSS) attacks if any user-supplied data is reflected in the output. The taint analysis also flagged one flow with unsanitized paths, which, while not classified as critical or high severity in this report, still indicates a potential for insecure handling of data that could be exploited, especially in conjunction with unescaped output.

In conclusion, while the plugin has a clean vulnerability history and avoids common pitfalls like raw SQL and dangerous functions, the complete lack of output escaping is a serious security flaw that should be addressed immediately. The unsanitized path flow also warrants investigation and remediation. The plugin's strengths lie in its minimal attack surface and adherence to basic WordPress security practices like prepared statements and nonce checks, but these are overshadowed by the critical output escaping deficiency.

Key Concerns

  • No output escaping
  • Unsanitized path in taint flow
Vulnerabilities
None known

Nevobo API Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Nevobo API Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
nvb_settings_page (nevobo-api.php:164)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Nevobo API Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[nevobo] nevobo-api.php:46
WordPress Hooks 4
actionwp_enqueue_scriptsnevobo-api.php:47
actionadmin_enqueue_scriptsnevobo-api.php:48
actionadmin_menunevobo-api.php:49
actionadmin_initnevobo-api.php:50
Maintenance & Trust

Nevobo API Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 26, 2020
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Nevobo API Developer Profile

Daan van Deventer

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Nevobo API

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/nevobo-api/classes/StreamGet.php/wp-content/plugins/nevobo-api/classes/StreamRender.php

HTML / DOM Fingerprints

CSS Classes
nevobofeed
HTML Comments
<!-- Start Nevobo API --><!-- https://wordpress.org/plugins/nevobo-api/ -->
FAQ

Frequently Asked Questions about Nevobo API