Primal for WordPress Security & Risk Analysis

wordpress.org/plugins/primal-for-wp

Engage your readers with great content that expresses your interests!

10 active installs v2.0.5 PHP + WP 3.5.1+ Updated Unknown
content-discoverycontent-recommendationsfeedsprimalrelated-content
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Primal for WordPress Safe to Use in 2026?

Generally Safe

Score 100/100

Primal for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of Primal-for-WP v2.0.5 reveals a plugin with a remarkably small attack surface, as indicated by zero AJAX handlers, REST API routes, shortcodes, and cron events. This suggests a minimalistic design that inherently reduces potential entry points for attackers. Furthermore, the code signals show no dangerous functions, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are all positive security indicators. However, a significant concern lies in the output escaping, where only 11% of outputs are properly escaped. This low percentage, despite a moderate number of output points, presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. The absence of nonce and capability checks across all entry points (though there are zero entry points reported) is also a point of consideration; if any entry points were to be introduced or discovered, they would likely lack essential security checks. The plugin also has no recorded vulnerability history, which is positive, but this could also mean the plugin hasn't been extensively audited or is relatively new, making the existing code-level risks more critical. Overall, while the plugin demonstrates good practices in database interaction and attack surface minimization, the prevalent issue with output escaping requires immediate attention to mitigate XSS risks.

Key Concerns

  • Low percentage of properly escaped output
  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

Primal for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Primal for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

11% escaped19 total outputs
Attack Surface

Primal for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_noticesprimal.php:74
actionwidgets_initprimal.php:75
actionwp_enqueue_scriptsprimal.php:76
filterthe_contentprimal.php:77
actionadmin_menusettings.php:5
actionadmin_initsettings.php:12
Maintenance & Trust

Primal for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedUnknown
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Primal for WordPress Developer Profile

Primal

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Primal for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/primal-for-wp/css/style.css/wp-content/plugins/primal-for-wp/js/resize.js
Script Paths
/wp-content/plugins/primal-for-wp/js/resize.js
Version Parameters
primal_styleresize

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Primal for WordPress