SM Replace Howdy Security & Risk Analysis

wordpress.org/plugins/replace-howdy-with-other-word

A wordpress plugin for replace Replace Howdy with another word.

200 active installs v1.0.0 PHP + WP 3.5.1+ Updated Sep 27, 2016
howdy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SM Replace Howdy Safe to Use in 2026?

Generally Safe

Score 85/100

SM Replace Howdy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "replace-howdy-with-other-word" plugin v1.0.0 demonstrates a generally good security posture based on the provided static analysis. The plugin has no identified CVEs, no known vulnerabilities, and a minimal attack surface with zero unprotected entry points. Furthermore, all SQL queries are executed using prepared statements, and there are no dangerous functions or file operations detected. This indicates a conscious effort towards secure coding practices.

However, a significant concern arises from the output escaping analysis, which shows that 100% of its total outputs are not properly escaped. This presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website through user-controlled data that is later displayed. While the plugin has a nonce check, the lack of capability checks on any potential entry points (though none are listed as unprotected) is a potential oversight if new entry points were to be added without proper authorization checks. The vulnerability history being completely clean is a positive sign, but it doesn't negate the present risk of unescaped output.

In conclusion, the plugin's lack of historical vulnerabilities and its use of prepared statements are strengths. However, the critical flaw of unescaped output significantly elevates its risk profile, making it vulnerable to XSS attacks. This weakness needs to be addressed urgently to improve the plugin's overall security.

Key Concerns

  • 100% of outputs are not properly escaped
Vulnerabilities
None known

SM Replace Howdy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SM Replace Howdy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
wp_replace_the_howdy_page (replace-howdy-with-other.php:19)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SM Replace Howdy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menureplace-howdy-with-other.php:16
filteradmin_bar_menureplace-howdy-with-other.php:67
Maintenance & Trust

SM Replace Howdy Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedSep 27, 2016
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs200
Developer Profile

SM Replace Howdy Developer Profile

Mahabubur Rahman

10 plugins · 650 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SM Replace Howdy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
bootstrap-wrapperhndleui-sortable-handle
Data Attributes
data-toggledata-target
FAQ

Frequently Asked Questions about SM Replace Howdy