NIH Cancer Dictionary Security & Risk Analysis

wordpress.org/plugins/nih-cancer-dictionary

Add NIH Cancer Dictionary Widget in the Sidebar of your Health and Medical Blog or Wesbite.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Dec 6, 2017
cancerhealthmedicaloncology
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is NIH Cancer Dictionary Safe to Use in 2026?

Generally Safe

Score 85/100

NIH Cancer Dictionary has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "nih-cancer-dictionary" plugin v1.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by avoiding raw SQL queries and has no recorded vulnerability history, suggesting a generally secure development approach.

However, significant concerns arise from the static analysis. The presence of the `create_function` is a critical security anti-pattern due to its potential for arbitrary code execution. Furthermore, 100% of the plugin's output is unescaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce and capability checks across all identified entry points (though zero in number) also indicates a potential for unauthorized actions if new entry points were to be added without proper security considerations.

The absence of known CVEs and a clean vulnerability history is a strong indicator of past diligence. Nevertheless, the identified code signals, particularly the dangerous function and unescaped output, present immediate risks that overshadow the lack of past issues. The plugin's strengths lie in its current lack of historical vulnerabilities and its use of prepared statements, but the identified static analysis issues require urgent attention.

Key Concerns

  • Dangerous function 'create_function' used
  • Output escaping missing on all outputs
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

NIH Cancer Dictionary Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

NIH Cancer Dictionary Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

NIH Cancer Dictionary Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function('', 'return register_widget("cancerdictionary");') );?>index.php:58

Output Escaping

0% escaped8 total outputs
Attack Surface

NIH Cancer Dictionary Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initindex.php:58
Maintenance & Trust

NIH Cancer Dictionary Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedDec 6, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

NIH Cancer Dictionary Developer Profile

Haseeb Ahmad Ayazi

4 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect NIH Cancer Dictionary

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://www.cancer.gov/publishedcontent/Js/TermDictionaryWidgetEnglish.js

HTML / DOM Fingerprints

CSS Classes
cancerdictionary
Shortcode Output
<script language="javascript" type="text/javascript" src="http://www.cancer.gov/publishedcontent/Js/TermDictionaryWidgetEnglish.js"></script>
FAQ

Frequently Asked Questions about NIH Cancer Dictionary