Random Security & Risk Analysis

wordpress.org/plugins/random

Random, a great plugin designed to insert random contents, posts and other types, into your website. Enjoy its shortcodes!

300 active installs v1.3 PHP 5.6+ WP 4.0+ Updated Oct 21, 2024
casualrandomrandom-contentrandom-postrandom-posts
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random Safe to Use in 2026?

Generally Safe

Score 92/100

Random has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "random" plugin v1.3 exhibits a generally positive security posture, with no recorded vulnerabilities or critical issues in static analysis. The absence of dangerous functions, file operations, external HTTP requests, and SQL queries using prepared statements are strong indicators of good development practices. However, there are notable areas for improvement.

The plugin has a concerning percentage of improperly escaped output (37%) which could lead to Cross-Site Scripting (XSS) vulnerabilities, especially when considering the presence of a shortcode as an entry point. The taint analysis revealing two flows with unsanitized paths, even without critical or high severity, suggests potential for unexpected behavior or information leakage if these paths are manipulated. Furthermore, the complete absence of nonce and capability checks across all entry points represents a significant security gap, potentially allowing unauthorized actions or access to plugin functionalities.

The lack of any historical vulnerabilities is a positive sign, suggesting the developers are either diligent or have not encountered issues. However, this should not be a reason for complacency, especially given the identified weaknesses. In conclusion, while the "random" plugin has a solid foundation by avoiding common pitfalls, the unescaped output and missing authentication/authorization checks are critical areas that require immediate attention to mitigate potential security risks.

Key Concerns

  • High percentage of unescaped output
  • Taint flows with unsanitized paths
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Random Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Random Release Timeline

v1.3Current
v1.2
v1.1.1
v1.1
v1.0.3
v1.0.2
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Random Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
41
69 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

63% escaped110 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
random_admin_page_shortcodes_handler (admin\partials\random-admin-display.php:64)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Random Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[random_post] includes\class-random.php:164
WordPress Hooks 6
actionplugins_loadedincludes\class-random.php:128
actionadmin_enqueue_scriptsincludes\class-random.php:142
actionadmin_enqueue_scriptsincludes\class-random.php:143
actionadmin_menuincludes\class-random.php:145
actionadmin_initincludes\class-random.php:146
filteradmin_footer_textrandom.php:97
Maintenance & Trust

Random Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 21, 2024
PHP min version5.6
Downloads8K

Community Trust

Rating100/100
Number of ratings4
Active installs300
Developer Profile

Random Developer Profile

Scribit

3 plugins · 9K total installs

84
trust score
Avg Security Score
94/100
Avg Patch Time
64 days
View full developer profile
Detection Fingerprints

How We Detect Random

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/random/admin/css/random-admin.css/wp-content/plugins/random/admin/js/random-admin.js
Version Parameters
random-admin.css?ver=random-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
scribit_credit
FAQ

Frequently Asked Questions about Random