Recent Comments by Entry Security & Risk Analysis

wordpress.org/plugins/recent-comments-by-entry

Display recent comments list simply on sidebar sort by entry.

10 active installs v0.1.0 PHP + WP 2.6+ Updated Jan 2, 2010
recent-commentsidebar
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Recent Comments by Entry Safe to Use in 2026?

Generally Safe

Score 85/100

Recent Comments by Entry has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "recent-comments-by-entry" plugin, version 0.1.0, exhibits a mixed security posture. On the positive side, the static analysis reveals a very limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no identified dangerous functions, file operations, external HTTP requests, or bundled libraries, which are good indicators of a secure foundation. The lack of any recorded vulnerabilities in its history is also a strong positive sign.

However, significant concerns arise from the code signals. A notable weakness is that 100% of the identified outputs are not properly escaped. This means that any dynamic data displayed by the plugin could be vulnerable to Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious scripts into web pages viewed by users. Additionally, while there are SQL queries present, only 50% use prepared statements, indicating a potential for SQL injection vulnerabilities in the remaining queries. The absence of nonce and capability checks further exacerbates these risks, as there are no built-in mechanisms to verify user authorization or prevent request forgery for any potential entry points, even though none were explicitly identified in the static analysis. While the attack surface is small, the lack of output escaping and insufficient SQL query sanitization coupled with absent authorization checks represent tangible risks. The plugin's history suggests a well-maintained codebase, but the current static analysis points to critical oversight in output handling and data sanitization.

Key Concerns

  • Unescaped output in 100% of cases
  • 50% of SQL queries not using prepared statements
  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

Recent Comments by Entry Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Recent Comments by Entry Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

0% escaped6 total outputs
Attack Surface

Recent Comments by Entry Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedwidget_recent_comments_by_entry.php:231
Maintenance & Trust

Recent Comments by Entry Maintenance & Trust

Maintenance Signals

WordPress version tested2.6
Last updatedJan 2, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Recent Comments by Entry Developer Profile

V.J.Catkick

10 plugins · 110 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Recent Comments by Entry

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
widget_recent_comments_by_entry
Data Attributes
id="rcbet_src_title"name="rcbet_src_title"id="rcbet_dst_max_entry"name="rcbet_dst_max_entry"id="rcbet_dst_max_comments"name="rcbet_dst_max_comments"+2 more
FAQ

Frequently Asked Questions about Recent Comments by Entry