Ozh' Better Feed Security & Risk Analysis

wordpress.org/plugins/ozh-better-feed

Your feed, on steroids : add a custom footer to RSS items with, for example, a copyright notice, a "Read More (400 words)" links, an "A …

700 active installs v2.2 PHP + WP 2.8+ Updated Sep 18, 2010
feedfooterozhrelatedrss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ozh' Better Feed Safe to Use in 2026?

Generally Safe

Score 85/100

Ozh' Better Feed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The static analysis of "ozh-better-feed" v2.2 reveals a plugin with a seemingly small attack surface, as indicated by zero AJAX handlers, REST API routes, shortcodes, and cron events that are exposed. However, this low attack surface is overshadowed by significant concerns in the code's construction. The presence of dangerous functions like `preg_replace(/e)` and `create_function` is a major red flag, as these can be exploited for code injection if user-supplied data is not meticulously sanitized before being passed to them. Furthermore, the plugin utilizes a single SQL query that is not prepared, introducing a risk of SQL injection. The lack of proper output escaping across all identified outputs is another critical weakness, potentially leading to cross-site scripting (XSS) vulnerabilities.

The plugin's vulnerability history is notably clean, with zero recorded CVEs. This absence of past vulnerabilities, coupled with the lack of specific taint flow issues identified in the static analysis, could suggest a limited risk of severe, pre-existing exploits. However, it's important to consider that a clean history doesn't negate the inherent risks introduced by the insecure coding practices observed. The plugin demonstrates strengths in not bundling external libraries and performing external HTTP requests, which are good security hygiene practices. Despite the clean CVE history, the identified coding issues, particularly the use of dangerous functions and lack of output escaping, present substantial security risks that require immediate attention. The absence of capability checks on the nonce check is also a concern.

Key Concerns

  • Dangerous functions used (preg_replace(/e), create_function)
  • SQL query not using prepared statements
  • Output escaping not properly implemented
  • Nonce check without capability checks
Vulnerabilities
None known

Ozh' Better Feed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ozh' Better Feed Code Analysis

Dangerous Functions
3
Raw SQL Queries
1
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace('/%%date\[([^]]+)\]%%/e'inc\feed.php:134
preg_replace(/e)preg_replace('/%%<\?php(.*?)\?>%%/e'inc\feed.php:138
create_functionadd_filter('user_can_richedit', create_function('','return false;'));inc\optionpage.php:67

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped9 total outputs
Attack Surface

Ozh' Better Feed Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterthe_contentinc\feed.php:45
actionin_admin_footerinc\optionpage.php:59
filteruser_can_richeditinc\optionpage.php:67
filterthe_contentwp_ozh_betterfeed.php:18
actionadmin_menuwp_ozh_betterfeed.php:22
filterozh_adminmenu_icon_better_feedwp_ozh_betterfeed.php:24
Maintenance & Trust

Ozh' Better Feed Maintenance & Trust

Maintenance Signals

WordPress version tested9.9
Last updatedSep 18, 2010
PHP min version
Downloads55K

Community Trust

Rating100/100
Number of ratings2
Active installs700
Developer Profile

Ozh' Better Feed Developer Profile

Ozh

27 plugins · 5K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ozh' Better Feed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ozh-better-feed/inc/feed.php/wp-content/plugins/ozh-better-feed/inc/core.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Ozh' Better Feed