PHP-Widgetify Security & Risk Analysis

wordpress.org/plugins/php-widgetify

Execute HTML, Text or PHP fast and easy with this Widgetify-widget.

40 active installs v1.0 PHP + WP 2.8+ Updated Nov 8, 2009
executehtmlphptextwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PHP-Widgetify Safe to Use in 2026?

Generally Safe

Score 85/100

PHP-Widgetify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The static analysis of php-widgetify v1.0 reveals a mixed security posture. On one hand, the plugin demonstrates good practices by having no observed AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests. However, the presence of one instance of the `create_function` dangerous function is a significant concern. This function is known to be insecure and can lead to code injection vulnerabilities if user-supplied data is used within it without proper sanitization.

The output escaping percentage is notably low at 14%, indicating a high risk of cross-site scripting (XSS) vulnerabilities where dynamic content is displayed to users without sufficient sanitization. The absence of nonce checks on any entry points, coupled with only one capability check, suggests that authentication and authorization might be weak for any code that does execute.

The vulnerability history for php-widgetify is clean, with zero recorded CVEs. This absence of past vulnerabilities is positive, but it does not negate the inherent risks identified in the static analysis. The low output escaping and the presence of `create_function` are direct code-level concerns that require attention, regardless of historical exploits. Overall, while the plugin has a minimal attack surface, the identified code quality issues, particularly concerning output escaping and the use of a dangerous function, present clear security weaknesses that should be addressed.

Key Concerns

  • Use of dangerous function 'create_function'
  • Low output escaping percentage (14%)
  • No nonce checks on entry points
Vulnerabilities
None known

PHP-Widgetify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PHP-Widgetify Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
12
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("PHP_Widgetify");'));execphp.php:61

Output Escaping

14% escaped14 total outputs
Attack Surface

PHP-Widgetify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initexecphp.php:61
Maintenance & Trust

PHP-Widgetify Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedNov 8, 2009
PHP min version
Downloads6K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

PHP-Widgetify Developer Profile

RMWebsec

1 plugin · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PHP-Widgetify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
execphpwidget
FAQ

Frequently Asked Questions about PHP-Widgetify