
Ozh' Better Feed Security & Risk Analysis
wordpress.org/plugins/ozh-better-feedYour feed, on steroids : add a custom footer to RSS items with, for example, a copyright notice, a "Read More (400 words)" links, an "A …
Is Ozh' Better Feed Safe to Use in 2026?
Generally Safe
Score 85/100Ozh' Better Feed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of "ozh-better-feed" v2.2 reveals a plugin with a seemingly small attack surface, as indicated by zero AJAX handlers, REST API routes, shortcodes, and cron events that are exposed. However, this low attack surface is overshadowed by significant concerns in the code's construction. The presence of dangerous functions like `preg_replace(/e)` and `create_function` is a major red flag, as these can be exploited for code injection if user-supplied data is not meticulously sanitized before being passed to them. Furthermore, the plugin utilizes a single SQL query that is not prepared, introducing a risk of SQL injection. The lack of proper output escaping across all identified outputs is another critical weakness, potentially leading to cross-site scripting (XSS) vulnerabilities.
The plugin's vulnerability history is notably clean, with zero recorded CVEs. This absence of past vulnerabilities, coupled with the lack of specific taint flow issues identified in the static analysis, could suggest a limited risk of severe, pre-existing exploits. However, it's important to consider that a clean history doesn't negate the inherent risks introduced by the insecure coding practices observed. The plugin demonstrates strengths in not bundling external libraries and performing external HTTP requests, which are good security hygiene practices. Despite the clean CVE history, the identified coding issues, particularly the use of dangerous functions and lack of output escaping, present substantial security risks that require immediate attention. The absence of capability checks on the nonce check is also a concern.
Key Concerns
- Dangerous functions used (preg_replace(/e), create_function)
- SQL query not using prepared statements
- Output escaping not properly implemented
- Nonce check without capability checks
Ozh' Better Feed Security Vulnerabilities
Ozh' Better Feed Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Ozh' Better Feed Attack Surface
WordPress Hooks 6
Maintenance & Trust
Ozh' Better Feed Maintenance & Trust
Maintenance Signals
Community Trust
Ozh' Better Feed Alternatives
RSS Related Posts
rss-related-posts
This plugin shows a list of 10 related post, called by rss from Google blogsearch.
Sexy RSS Footer
sexy-rss-footer
Sexy RSS Footer enables you to add any possible content at the end of every feed entry. This includes variables like number of comments, author etc.
ViperFeed
viperfeed
ViperFeed adds a gorgeous footer to your RSS feed. This will be displayed for people who get your blog posts via email, or in an RSS reader.
RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging
wp-rss-aggregator
The #1 WordPress RSS aggregator to quickly import RSS feeds, build a news aggregator, and for easy autoblogging.
RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
feedzy-rss-feeds
The most powerful WordPress RSS aggregator, helping you curate content, autoblog, import RSS & display unlimited RSS feeds within a few minutes.
Ozh' Better Feed Developer Profile
27 plugins · 5K total installs
How We Detect Ozh' Better Feed
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/ozh-better-feed/inc/feed.php/wp-content/plugins/ozh-better-feed/inc/core.php