References Security & Risk Analysis

wordpress.org/plugins/references

Enables post references (for any type of publications) to connect articles to each other.

30 active installs v1.202 PHP + WP 3.0+ Updated Feb 20, 2025
node-referencepost-connectionsreference
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is References Safe to Use in 2026?

Generally Safe

Score 92/100

References has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "references" plugin version 1.202 exhibits a mixed security posture. While it shows strengths in its limited attack surface, absence of external requests, and basic nonce check, significant concerns arise from its code analysis. The presence of the `unserialize()` function is a major red flag, as it can lead to remote code execution vulnerabilities if used with untrusted input. Furthermore, the low percentage of properly escaped outputs (16%) indicates a high risk of cross-site scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website.

The plugin's vulnerability history is currently clean, with no recorded CVEs. This is a positive sign, suggesting that the developers may have a good track record or that the plugin hasn't been extensively targeted. However, this absence of history should not overshadow the inherent risks identified in the static analysis. The lack of capability checks is also a concern, as it implies that actions performed by the plugin might not be properly restricted to authorized users.

In conclusion, while the "references" plugin has a small attack surface and a clean vulnerability history, the identified code weaknesses, particularly `unserialize()` and poor output escaping, present substantial security risks. These issues require immediate attention to mitigate potential exploits and ensure the plugin's secure operation. The absence of capability checks further weakens its security posture.

Key Concerns

  • Dangerous function unserialize found
  • Low percentage of output escaping
  • SQL queries not always prepared
  • No capability checks on entry points
Vulnerabilities
None known

References Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

References Code Analysis

Dangerous Functions
1
Raw SQL Queries
4
1 prepared
Unescaped Output
46
9 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserialize$value = @unserialize($v->meta_value);references.php:229

Bundled Libraries

jQuery

SQL Query Safety

20% prepared5 total queries

Output Escaping

16% escaped55 total outputs
Attack Surface

References Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ref] references.php:299
WordPress Hooks 5
actionadmin_enqueue_scriptsreferences.php:293
actionadmin_menureferences.php:294
actionadd_meta_boxesreferences.php:295
actionsave_postreferences.php:296
actionwidgets_initreferences.php:771
Maintenance & Trust

References Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedFeb 20, 2025
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

References Developer Profile

Ashraful Sarkar Naiem

43 plugins · 19K total installs

73
trust score
Avg Security Score
91/100
Avg Patch Time
111 days
View full developer profile
Detection Fingerprints

How We Detect References

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/references/js/admin.js/wp-content/plugins/references/css/admin.css
Script Paths
/wp-content/plugins/references/js/admin.js
Version Parameters
ver=1.202

HTML / DOM Fingerprints

HTML Comments
<!-- REFShraAPI --><!-- References PLugin Class -->
Data Attributes
data-post_iddata-ref_key
JS Globals
REFShraAPI
Shortcode Output
<div class="ref-block">
FAQ

Frequently Asked Questions about References