NoFollowr Security & Risk Analysis

wordpress.org/plugins/nofollowr

Browsing a site as an admin, icons are added to external links indicating their nofollow status. Clicking the icons toggles nofollow status via Ajax.

200 active installs v1.2.0 PHP + WP 3.4+ Updated Mar 20, 2017
external-linksexternalslinksnofollowrel
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is NoFollowr Safe to Use in 2026?

Generally Safe

Score 85/100

NoFollowr has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The nofollowr plugin v1.2.0 exhibits a generally strong security posture based on the static analysis. The absence of any identified dangerous functions, raw SQL queries, file operations, external HTTP requests, and the complete reliance on prepared statements for SQL indicate good development practices. Furthermore, the lack of critical or high severity taint flows suggests that the plugin is not introducing obvious vulnerabilities related to data handling.

However, there are a few areas that warrant attention. The complete lack of nonce checks, coupled with the presence of capability checks without clear indication of their scope, raises a minor concern. While the attack surface appears to be zero, the absence of nonce checks could become a vulnerability if any entry points were to be introduced in future updates or if the existing capability checks are not robust enough to prevent privilege escalation. The imperfect output escaping, with 20% of outputs not being properly escaped, also presents a potential risk for cross-site scripting (XSS) vulnerabilities, albeit likely of lower severity given the limited scope of outputs.

Notably, the plugin has no recorded vulnerability history, which is a positive sign. This suggests a history of secure development or diligent patching of any past issues. Overall, nofollowr appears to be a secure plugin with a good track record, but the minor concerns around output escaping and the complete absence of nonce checks should be monitored, especially if the plugin's functionality or attack surface expands in the future.

Key Concerns

  • 20% of outputs not properly escaped
  • 0 nonce checks present
Vulnerabilities
None known

NoFollowr Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

NoFollowr Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped5 total outputs
Attack Surface

NoFollowr Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_enqueue_scriptsnofollowr.php:61
filterthe_contentnofollowr.php:62
filterquery_varsnofollowr.php:64
actiontemplate_redirectnofollowr.php:65
actioninitnofollowr.php:196
Maintenance & Trust

NoFollowr Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMar 20, 2017
PHP min version
Downloads19K

Community Trust

Rating64/100
Number of ratings5
Active installs200
Developer Profile

NoFollowr Developer Profile

joel_birch

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect NoFollowr

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/nofollowr/css/NoFollowr-min.css/wp-content/plugins/nofollowr/js/NoFollowr-min.js
Script Paths
/wp-content/plugins/nofollowr/js/NoFollowr-min.js
Version Parameters
nofollowr/css/NoFollowr-min.css?ver=nofollowr/js/NoFollowr-min.js?ver=

HTML / DOM Fingerprints

CSS Classes
jbPost
Data Attributes
id="jbID-class="jbPost"
JS Globals
jbirchPlugin
FAQ

Frequently Asked Questions about NoFollowr