Per Page Widgets Security & Risk Analysis

wordpress.org/plugins/per-page-widgets

Control widget areas on a per-page / per-post basis.

300 active installs v0.0.7 PHP + WP 3.3+ Updated Jul 2, 2012
pagespostssidebarswidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Per Page Widgets Safe to Use in 2026?

Generally Safe

Score 85/100

Per Page Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "per-page-widgets" plugin version 0.0.7 exhibits a generally positive security posture based on the provided static analysis. The plugin has a remarkably small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, significantly limiting potential entry points for attackers. Furthermore, all SQL queries utilize prepared statements, which is a strong defense against SQL injection vulnerabilities. The presence of nonce and capability checks, although only one each, indicates an awareness of WordPress security best practices.

However, a notable concern arises from the low percentage of properly escaped output (25%). This suggests that a significant portion of the data output by the plugin may not be adequately sanitized, potentially leading to Cross-Site Scripting (XSS) vulnerabilities if user-supplied or dynamically generated content is displayed without proper escaping. The taint analysis reporting zero flows is a positive sign, but it's crucial to remember that this is based on the available code analysis and may not cover all potential scenarios.

The plugin's vulnerability history is clean, with no recorded CVEs. This, coupled with the lack of dangerous functions and file operations, paints a picture of a plugin that has historically been developed with security in mind. Despite the output escaping concern, the overall lack of exploitable entry points and secure data handling for SQL makes this plugin appear relatively safe. The primary risk lies in potential XSS vulnerabilities due to insufficient output escaping.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Per Page Widgets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Per Page Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
24
8 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped32 total outputs
Attack Surface

Per Page Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filtersidebars_widgetsi123_per_page_widgets.php:20
actionsidebar_admin_setupi123_per_page_widgets.php:48
actionsidebar_admin_pagei123_per_page_widgets.php:130
actionadd_meta_boxesi123_per_page_widgets.php:187
actionsave_posti123_per_page_widgets.php:188
Maintenance & Trust

Per Page Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedJul 2, 2012
PHP min version
Downloads17K

Community Trust

Rating84/100
Number of ratings5
Active installs300
Developer Profile

Per Page Widgets Developer Profile

Internet123

1 plugin · 300 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Per Page Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
i123_widgets_special_widget_area
HTML Comments
<!-- A failed attempt to clone the existing widget area content --><!-- Why is this difficult? --><!-- -Because widgets have id's and stuff that cannot be duplicated by simply copying the widget. -->
Data Attributes
data-i123-widgets-id
JS Globals
i123_widgets_sidebars_to_alteri123_widgets_sidebars_to_hidei123_widgets_is_speciali123_widgets_my_idi123_widgets_help_text
FAQ

Frequently Asked Questions about Per Page Widgets