PageProofer Security & Risk Analysis

wordpress.org/plugins/pageproofer

Allow developers, designers, clients and site visitors to easily leave feedback directly on your website.

50 active installs v1.4.0 PHP + WP 3.0.1+ Updated Unknown
bug-trackingfeedback-widgetissue-feedbackvisual-feedbackwebsite-feedback
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PageProofer Safe to Use in 2026?

Generally Safe

Score 100/100

PageProofer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of PageProofer v1.4.0 reveals a generally strong security posture with no identified attack surface through AJAX, REST API, shortcodes, or cron events. The absence of dangerous functions and reliance on prepared statements for SQL queries are positive indicators of secure coding practices. However, the analysis flags a significant concern regarding output escaping, with 100% of identified outputs being unescaped. This means that any data rendered by the plugin could potentially be vulnerable to cross-site scripting (XSS) attacks if user-supplied input is not properly sanitized before display.

The vulnerability history for PageProofer is clean, with no recorded CVEs. This suggests a good track record of security over time, potentially indicating diligent patching or robust development practices in the past. The lack of taint analysis results, while seemingly positive, could also be due to the limited attack surface analyzed or the absence of detectable taint flows within the analyzed code. The overall conclusion is that while the plugin exhibits good practices in terms of attack surface management and database interaction, the unescaped output represents a critical security weakness that needs immediate attention.

Key Concerns

  • All identified outputs are unescaped.
Vulnerabilities
None known

PageProofer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PageProofer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

PageProofer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadedincludes\class-pageproofer.php:142
actionadmin_menuincludes\class-pageproofer.php:157
actionadmin_initincludes\class-pageproofer.php:158
actionwp_enqueue_scriptsincludes\class-pageproofer.php:173
actionwp_enqueue_scriptsincludes\class-pageproofer.php:174
actionwp_footerpublic\class-pageproofer-public.php:86
Maintenance & Trust

PageProofer Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

PageProofer Developer Profile

pageproofer

1 plugin · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PageProofer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pageproofer/css/pageproofer-admin.css/wp-content/plugins/pageproofer/js/pageproofer-admin.js
Script Paths
/wp-content/plugins/pageproofer/js/pageproofer-admin.js
Version Parameters
pageproofer/css/pageproofer-admin.css?ver=pageproofer/js/pageproofer-admin.js?ver=

HTML / DOM Fingerprints

Data Attributes
name='pageproofer_settings[pageproofer_site_key]'name='pageproofer_settings[pageproofer_enabled]'
FAQ

Frequently Asked Questions about PageProofer