No WWW Security & Risk Analysis

wordpress.org/plugins/no-www

WWW checks in, it doesn't check out.

100 active installs v1.1 PHP + WP + Updated Dec 17, 2014
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is No WWW Safe to Use in 2026?

Generally Safe

Score 85/100

No WWW has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "no-www" v1.1 plugin exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any detected dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and unescaped output demonstrates a commitment to secure coding practices. Furthermore, the plugin's minimal attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces the potential for exploitation. The clean vulnerability history with zero recorded CVEs, regardless of severity, further reinforces this positive assessment.

While the static analysis indicates a single flow with an unsanitized path in the taint analysis, it's crucial to note that this flow did not result in a critical or high severity vulnerability. This suggests the unsanitized path may be contained or inconsequential within the plugin's context. The plugin also lacks capability checks and nonce checks, which are generally good security practices, especially for actions that might modify data or perform sensitive operations. However, given the plugin's reported zero attack surface points and lack of exploitable functions, these omissions may not represent an immediate, exploitable risk in this specific case, but they are areas for potential future hardening.

In conclusion, the "no-www" v1.1 plugin appears to be highly secure, with a well-maintained codebase and no known vulnerabilities. The primary area for consideration is the single taint flow with an unsanitized path, although its low severity minimizes immediate concern. The absence of nonce and capability checks, while not currently leading to a discovered vulnerability, represents a minor weakness that could be addressed for enhanced security robustness.

Key Concerns

  • Flow with unsanitized paths detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

No WWW Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

No WWW Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<no-www> (no-www.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

No WWW Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

No WWW Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 17, 2014
PHP min version
Downloads21K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Alternatives

No WWW Alternatives

No alternatives data available yet.

Developer Profile

No WWW Developer Profile

Automattic

393 plugins · 20.8M total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
1192 days
View full developer profile
Detection Fingerprints

How We Detect No WWW

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about No WWW