Plugins Genius Security & Risk Analysis

wordpress.org/plugins/plugins-genius

Role-based active plugins manager. Choose which plugins should be active for each WordPress role in the backend and in the frontend.

10 active installs v2.1.1 PHP + WP 3.0.0+ Updated Aug 29, 2016
pluginsroleroles
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Plugins Genius Safe to Use in 2026?

Generally Safe

Score 85/100

Plugins Genius has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "plugins-genius" v2.1.1 plugin exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and a clean vulnerability history is a strong positive indicator. Furthermore, the code analysis shows no dangerous functions, no raw SQL queries, no file operations, and no external HTTP requests, all of which significantly reduce the potential attack surface and risk of common web vulnerabilities.

However, a critical concern is the lack of output escaping. With 100% of 17 identified output points being unescaped, this plugin is highly vulnerable to Cross-Site Scripting (XSS) attacks. Any data that is displayed to users and originates from user input or external sources without proper sanitization and escaping can be leveraged by an attacker to inject malicious scripts. While the plugin has some security checks like nonce and capability checks, the pervasive lack of output escaping creates a significant and exploitable weakness.

In conclusion, while the plugin has strengths in its minimal attack surface and lack of historical vulnerabilities, the critical flaw in output escaping presents a substantial risk. Remediation of the unescaped output is paramount to securing this plugin against XSS attacks. The current state is a mix of good practices and a severe oversight in output handling.

Key Concerns

  • 100% of outputs are unescaped
Vulnerabilities
None known

Plugins Genius Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Plugins Genius Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
config (plugins-genius.php:272)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Plugins Genius Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterpre_option_active_pluginsplugins-genius.php:29
actionpre_current_active_pluginsplugins-genius.php:57
actionadmin_menuplugins-genius.php:59
actionshutdownplugins-genius.php:60
actionshutdownplugins-genius.php:565
Maintenance & Trust

Plugins Genius Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 29, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings3
Active installs10
Developer Profile

Plugins Genius Developer Profile

Marco Canestrari

5 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Plugins Genius

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/plugins-genius/css/style.css
Script Paths
/wp-content/plugins/plugins-genius/js/plugins-genius.js
Version Parameters
plugins-genius/css/style.css?ver=plugins-genius/js/plugins-genius.js?ver=

HTML / DOM Fingerprints

CSS Classes
pg_counter
Data Attributes
data-slug="plugins-genius"
JS Globals
jQuery
FAQ

Frequently Asked Questions about Plugins Genius