RB Simple FAQs Security & Risk Analysis

wordpress.org/plugins/rb-simple-faqs

A simple, lightweight plugin for managing and displaying frequently asked questions using a custom post type.

20 active installs v1.1.0 PHP + WP 4.3+ Updated Unknown
customisationfaqfaqsfrequently-asked-questionsquestions-and-answers
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RB Simple FAQs Safe to Use in 2026?

Generally Safe

Score 100/100

RB Simple FAQs has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The rb-simple-faqs plugin version 1.1.0 exhibits a generally good security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests are all positive indicators. Notably, the plugin has a limited attack surface with only one shortcode and no AJAX or REST API endpoints, further reducing potential avenues for exploitation. The vulnerability history shows no known CVEs, suggesting a history of secure development or a lack of past critical findings.

However, there are areas for improvement. The code signals indicate that only 63% of output is properly escaped, which presents a potential risk for cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed. The complete lack of nonce checks and capability checks on its single entry point (the shortcode) is a significant concern, as it implies that any user, regardless of their logged-in status or role, can potentially trigger the shortcode's functionality. This could lead to unintended behavior or information disclosure if the shortcode processes or displays sensitive data.

In conclusion, while the plugin benefits from a small attack surface and no known vulnerabilities, the unescaped output and missing authorization checks on its sole entry point represent real security concerns that should be addressed to improve its overall security. The absence of taint analysis data also means potential vulnerabilities within complex data flows remain unevaluated.

Key Concerns

  • Output not properly escaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

RB Simple FAQs Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RB Simple FAQs Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
9
15 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

63% escaped24 total outputs
Attack Surface

RB Simple FAQs Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[faqs] faqs.php:48
WordPress Hooks 8
actioninitfaqs.php:33
actioninitfaqs.php:34
actionwp_enqueue_scriptsfaqs.php:44
actionmanage_edit-faqs_columnsinc\custom_columns.php:7
actionmanage_faqs_posts_custom_columninc\custom_columns.php:21
actionadmin_footerinc\custom_columns.php:28
actionadmin_initinc\settings.php:106
actionadmin_menuinc\settings.php:113
Maintenance & Trust

RB Simple FAQs Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

RB Simple FAQs Developer Profile

redballoondesignltd

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RB Simple FAQs

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about RB Simple FAQs