Readers From RSS 2 Blog Lite Security & Risk Analysis

wordpress.org/plugins/readers-from-rss-2-blog

Increase Your SALES And BLOG Audience By Turning Your BLOG RSS FEED Into A Powerful MARKETING Machine

100 active installs v3.0.1.4 PHP + WP 3.0+ Updated Sep 14, 2014
feedfeedburnergoogle-readerrssrss-marketing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Readers From RSS 2 Blog Lite Safe to Use in 2026?

Generally Safe

Score 85/100

Readers From RSS 2 Blog Lite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "readers-from-rss-2-blog" v3.0.1.4 plugin exhibits a mixed security posture. While the static analysis reveals no direct external attack surface (no AJAX handlers, REST API routes, shortcodes, or cron events accessible without authentication), there are significant internal code concerns. The presence of dangerous functions like `create_function` and `unserialize` is a red flag, as these can lead to arbitrary code execution if improperly handled with user-supplied data. Furthermore, only 25% of output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially if any of the unsanitized taint flows lead to output. The taint analysis itself shows a concerning 100% of analyzed flows have unsanitized paths, even if classified as not critical or high severity in this specific analysis run. This suggests a general lack of input sanitization within the plugin's code. The lack of any recorded vulnerability history is a positive sign, but it does not negate the inherent risks identified in the static and taint analysis. The plugin appears to have been developed without a strong focus on security best practices regarding input validation and output escaping, despite a seemingly limited external attack vector.

Key Concerns

  • Dangerous functions used (`create_function`, `unserialize`)
  • Low percentage of properly escaped output (5%)
  • All taint flows have unsanitized paths
  • SQL queries not always using prepared statements (50%)
  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

Readers From RSS 2 Blog Lite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Readers From RSS 2 Blog Lite Code Analysis

Dangerous Functions
4
Raw SQL Queries
4
4 prepared
Unescaped Output
71
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter('user_can_richedit', create_function('','return false;'));readers-from-rss-2-blog.php:212
create_functionadd_action('widgets_init', create_function('', 'return register_widget("ReadersFromRSS2BlogWidget");readers-from-rss-2-blog.php:538
unserializeif ( $row['option_name'] == 'rfr2b_affiliate_options' ) $this->fetch_rfr2b_affiliateOptions = unseriwpsmartapps-lic\readers-from-rss-2-blog.cls.php:124
unserializeif ( $row['option_name'] == 'rfr2b_control_options' ) $this->fetch_rfr2b_control_options = unserialiwpsmartapps-lic\readers-from-rss-2-blog.cls.php:131

SQL Query Safety

50% prepared8 total queries

Output Escaping

5% escaped75 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
__rfr2b_header (wpsmartapps-lic\readers-from-rss-2-blog.cls.php:139)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Readers From RSS 2 Blog Lite Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
filterplugin_action_linksreaders-from-rss-2-blog.php:51
actionadmin_menureaders-from-rss-2-blog.php:52
actionadmin_noticesreaders-from-rss-2-blog.php:62
filterthe_contentreaders-from-rss-2-blog.php:64
filterthe_excerpt_rssreaders-from-rss-2-blog.php:65
filterposts_wherereaders-from-rss-2-blog.php:69
filterget_lastpostmodifiedreaders-from-rss-2-blog.php:73
actionrss2_nsreaders-from-rss-2-blog.php:75
actionatom_nsreaders-from-rss-2-blog.php:76
actionrdf_nsreaders-from-rss-2-blog.php:77
actionrss2_comments_nsreaders-from-rss-2-blog.php:79
actionatom_comments_nsreaders-from-rss-2-blog.php:80
filteruser_can_richeditreaders-from-rss-2-blog.php:212
actionwidgets_initreaders-from-rss-2-blog.php:538
Maintenance & Trust

Readers From RSS 2 Blog Lite Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 14, 2014
PHP min version
Downloads40K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Readers From RSS 2 Blog Lite Developer Profile

wpsmartapps

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Readers From RSS 2 Blog Lite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/images/rfr2b-logo.png/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/images/upgrade.gif/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/images/left-arrow.png/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/images/right-arrow.png/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/images/close-form.gif/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/admin-pg/demo/googlereader.jpg/wp-content/plugins/readers-from-rss-2-blog/wpsmartapps-lic/images/tick.png
Version Parameters
readers-from-rss-2-blog/readers-from-rss-2-blog.php

HTML / DOM Fingerprints

Data Attributes
id="global_demo"
JS Globals
ma_feed
FAQ

Frequently Asked Questions about Readers From RSS 2 Blog Lite