Refericon Security & Risk Analysis

wordpress.org/plugins/refericon

Refericon ułatwia rekomendowanie Twoich produktów przez zadowolonych klientów ich znajomym. Instalacja i ustawienie programu referencyjnego trwa nieca …

10 active installs v1.0 PHP + WP 4.0+ Updated Apr 19, 2017
giftrefericonstable
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Refericon Safe to Use in 2026?

Generally Safe

Score 85/100

Refericon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The refericon plugin v1.0 exhibits a seemingly strong security posture based on the static analysis, with no direct attack surface exposed through common WordPress entry points like AJAX handlers, REST API, shortcodes, or cron events. The absence of dangerous functions, file operations, external HTTP requests, and recorded vulnerabilities (CVEs) further contributes to this positive impression. Furthermore, all SQL queries are reportedly using prepared statements, which is a best practice for preventing SQL injection. However, the analysis also reveals significant concerns. A complete lack of output escaping across all identified output points is a critical weakness that could lead to cross-site scripting (XSS) vulnerabilities. The presence of unsanitized paths in taint analysis, even if not classified as critical or high severity, indicates potential for insecure file operations or path traversal if these flows were to be triggered. The lack of nonce checks and capability checks on any entry points, combined with the complete absence of any authentication or permission checks on the identified entry points, means that any potential future vulnerabilities in these areas would be immediately exploitable. The plugin's vulnerability history being clean is a positive sign, but it's important to note that this can sometimes be due to a lack of extensive security auditing or testing, rather than inherent robust security. Therefore, while the plugin avoids many common pitfalls, the unaddressed output escaping and potential taint flows coupled with a complete lack of authorization checks present a notable risk.

Key Concerns

  • 0% output escaping
  • 2 unsanitized paths in taint analysis
  • No nonce checks
  • No capability checks
  • 0 unprotected entry points, but lack of auth checks is concerning
Vulnerabilities
None known

Refericon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Refericon Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Refericon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
page (index.php:29)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Refericon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuindex.php:20
actionwp_footerindex.php:21
Maintenance & Trust

Refericon Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedApr 19, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Refericon Developer Profile

refericon

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Refericon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/refericon/assets/ri-logo32.png/wp-content/plugins/refericon/assets/ri-logo.png

HTML / DOM Fingerprints

CSS Classes
refericon-logo
Data Attributes
data-refericon
FAQ

Frequently Asked Questions about Refericon