Oomph Clone Widgets Security & Risk Analysis

wordpress.org/plugins/oomph-clone-widgets

Insert a "+" button on widget titles in the widgets screen that will copy the widget and all of its settings into a new widget.

400 active installs v2.0.0 PHP + WP 3.8+ Updated Feb 22, 2014
clonesidebarwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Oomph Clone Widgets Safe to Use in 2026?

Generally Safe

Score 85/100

Oomph Clone Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "oomph-clone-widgets" plugin version 2.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points is a significant strength. Furthermore, the code demonstrates good development practices with no dangerous functions, all SQL queries using prepared statements, and proper output escaping. The lack of file operations, external HTTP requests, and the absence of vulnerability history, including CVEs, further contribute to its positive security assessment.

However, a notable concern is the complete lack of any security checks like nonce checks or capability checks. While the current attack surface is zero and no vulnerabilities are reported, this indicates a potential weakness. If the plugin were to introduce any entry points in the future without implementing these fundamental security mechanisms, it would immediately become vulnerable. The lack of recorded vulnerabilities could also mean it hasn't been extensively tested or targeted historically, rather than an inherent invulnerability. In conclusion, the plugin is currently very secure due to its minimal attack surface and good coding practices, but the absence of basic security checks represents a potential future risk.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Oomph Clone Widgets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Oomph Clone Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Oomph Clone Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filteradmin_headoomph-clone-widgets.php:32
Maintenance & Trust

Oomph Clone Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 22, 2014
PHP min version
Downloads12K

Community Trust

Rating86/100
Number of ratings26
Active installs400
Developer Profile

Oomph Clone Widgets Developer Profile

Ben Doherty (Oomph, Inc)

2 plugins · 900 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Oomph Clone Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/oomph-clone-widgets/oomph-clone-widgets.php

HTML / DOM Fingerprints

CSS Classes
oomph-cloneableclone-widget-actionclone-widget
Data Attributes
data-oomph-cloneable
JS Globals
Oomph.CloneWidgets
FAQ

Frequently Asked Questions about Oomph Clone Widgets