Readers Wall Security & Risk Analysis

wordpress.org/plugins/readers-wall

高度自定制性能的读者墙

10 active installs v1.3.7 PHP + WP 3.0+ Updated Aug 17, 2016
commentslinkpagepostwall
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Readers Wall Safe to Use in 2026?

Generally Safe

Score 85/100

Readers Wall has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "readers-wall" plugin version 1.3.7 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for its SQL queries and having a reported history free of any known CVEs. There are no external HTTP requests or file operations, which reduces the attack surface in those areas. However, significant concerns arise from the static analysis. The complete lack of output escaping for all identified output points is a critical weakness, potentially leading to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without sanitization. Furthermore, the absence of nonce and capability checks across all entry points, including the lack of authentication checks on any AJAX handlers or permission callbacks on REST API routes, represents a substantial risk. While the taint analysis did not reveal critical or high severity flows, the presence of unsanitized paths suggests that with a larger attack surface or more complex interactions, vulnerabilities could be introduced. The vulnerability history, while clean, could also indicate limited historical scrutiny. Overall, the lack of proper output escaping and authentication/authorization controls on all potential entry points are the most pressing issues.

Key Concerns

  • 0% of output properly escaped
  • 0 Nonce checks
  • 0 Capability checks
  • Unprotected AJAX handlers
  • Unprotected REST API routes
  • Flows with unsanitized paths
Vulnerabilities
None known

Readers Wall Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Readers Wall Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped9 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
qw_RW_setpage (readers-wall.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Readers Wall Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuinc\leniy_admin_menu.php:23
actionadmin_menureaders-wall.php:51
Maintenance & Trust

Readers Wall Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedAug 17, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Readers Wall Developer Profile

Leniy

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Readers Wall

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/readers-wall/resource/default.png

HTML / DOM Fingerprints

CSS Classes
RW-btnRW-btn-slide-text
Data Attributes
name="qw_RW_css"name="qw_RW_shortcode"name="qw_RW_shownumber"name="qw_RW_commentatleast"name="qw_RW_days"name="qw_RW_manualcss"+7 more
JS Globals
qwshowqwhide
Shortcode Output
<a title="
FAQ

Frequently Asked Questions about Readers Wall