Plug & Play Security & Risk Analysis

wordpress.org/plugins/plug-and-play

Plug and Play our feautures and turn your WordPress Blog into a Highly Interactive, Elegant and Secure Blog.

10 active installs v1.2 PHP + WP 3.9.0+ Updated Jul 11, 2016
posts-comparatorwordpress-change-login-logowordpress-hide-admin-barwordpress-security-toolswp-generator-meta-tag-removerwp-recents-posts-shows
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Plug & Play Safe to Use in 2026?

Generally Safe

Score 85/100

Plug & Play has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "plug-and-play" v1.2 plugin exhibits a mixed security posture. On one hand, it demonstrates good practices by having a clean attack surface with no apparent entry points for direct manipulation and a complete absence of dangerous functions. The fact that all SQL queries utilize prepared statements is a significant strength, mitigating common SQL injection risks. However, a critical concern arises from the complete lack of output escaping, with 0% of the 92 identified output points being properly escaped. This opens the door to Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the site's output, impacting users. The plugin also makes an external HTTP request, which could be a vector if not handled carefully. The vulnerability history is currently clean, with no recorded CVEs, which is positive, but this doesn't negate the identified code-level risks. The lack of known vulnerabilities could also indicate limited testing or a lack of public scrutiny, making the identified code weaknesses more significant.

Key Concerns

  • 0% properly escaped output points
  • External HTTP request without clear handling
  • No nonce checks on potential entry points (though none exist)
  • Capability checks present but might be insufficient without context
Vulnerabilities
None known

Plug & Play Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plug & Play Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
92
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped92 total outputs
Attack Surface

Plug & Play Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionadmin_enqueue_scriptsbPress\WP2P.class.php:21
actionadmin_menubPress\WP2P.class.php:22
actionwp_loadedbPress\WP2P.class.php:25
actionwp_headbPress\WP2P.class.php:26
actionlogin_enqueue_scriptsbPress\WP2P.class.php:27
actioninitbPress\WP2P.class.php:29
actioninitbPress\WP2P.class.php:30
actionwp_footerbPress\WP2P.class.php:31
actionlogin_headbPress\WP2P.class.php:51
filterlogin_headerurlbPress\WP2P.class.php:53
filtershow_admin_barbPress\WP2P.class.php:65
filterthe_generatorbPress\WP2P.class.php:138
actionplugins_loadedindex.php:20
Maintenance & Trust

Plug & Play Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJul 11, 2016
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

Plug & Play Alternatives

No alternatives data available yet.

Developer Profile

Plug & Play Developer Profile

Bassem Rabia

5 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plug & Play

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/plug-and-play/js/bPress-wp.js/wp-content/plugins/plug-and-play/css/bPress-wp.css
Script Paths
http://store.norfolky.com/bPress.js

HTML / DOM Fingerprints

CSS Classes
bPress_under_maintenancebPress_timerDaysHoursMinutesSeconds
Data Attributes
id="bPress_under_maintenance"id="bPress_timer"
JS Globals
Logo_Signup_PagebApibQuery
FAQ

Frequently Asked Questions about Plug & Play