Page Modified Security & Risk Analysis

wordpress.org/plugins/page-modified

Display the results of your Page Modified crawls right within your WordPress Admin.

10 active installs v1.0.4 PHP + WP 4.0+ Updated Dec 14, 2017
crawlerpage-modifiedpagemodifiedutility
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Page Modified Safe to Use in 2026?

Generally Safe

Score 85/100

Page Modified has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "page-modified" plugin v1.0.4 exhibits a generally good security posture, with a notable absence of known vulnerabilities and a clean taint analysis. The plugin correctly utilizes prepared statements for all its SQL queries, which is a critical security best practice. It also demonstrates some level of capability checks, indicating an awareness of WordPress's permission system.

However, there are significant concerns regarding output escaping. With only 6% of outputs properly escaped out of 17 total, this plugin presents a high risk of Cross-Site Scripting (XSS) vulnerabilities. An attacker could potentially inject malicious scripts through user-supplied data that is displayed without proper sanitization. The lack of nonce checks, especially if there were any AJAX handlers (though none were detected), is also a potential area of weakness that could be exploited in conjunction with other vulnerabilities.

Given the clean vulnerability history, it's possible the plugin developers have not encountered security issues or have addressed them thoroughly in the past. However, the current static analysis highlights a critical oversight in output escaping that needs immediate attention. The plugin's strengths lie in its SQL handling and lack of known CVEs, but the significant weakness in output sanitization overshadows these positives and poses a substantial risk.

Key Concerns

  • Low percentage of properly escaped output
  • No nonce checks found
Vulnerabilities
None known

Page Modified Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Page Modified Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
1 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

6% escaped17 total outputs
Attack Surface

Page Modified Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_dashboard_setupincludes\admin\class-dashboard-widget.php:33
filteradmin_initincludes\admin\class-page-modified-settings.php:40
filteradmin_menuincludes\admin\class-page-modified-settings.php:41
actionadmin_enqueue_scriptswp-page-modified.php:105
actionplugins_loadedwp-page-modified.php:137
Maintenance & Trust

Page Modified Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 14, 2017
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Page Modified Developer Profile

Chris Klosowski

9 plugins · 860 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Page Modified

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/page-modified/assets/css/admin.css
Script Paths
https://cdnjs.cloudflare.com/ajax/libs/Chart.js/2.7.1/Chart.bundle.min.js
Version Parameters
page-modified/assets/css/admin.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Page Modified