rng-isuc Security & Risk Analysis

wordpress.org/plugins/rng-isuc

WordPress Plugin that shows the last post viewed by a user in several template views like widget, shortcode and sidebar navigation isuc is standing fo …

0 active installs v1.0 PHP + WP 4.0+ Updated May 8, 2019
post-viewedrecent-post-viewedrng
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is rng-isuc Safe to Use in 2026?

Generally Safe

Score 85/100

rng-isuc has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "rng-isuc" v1.0 plugin demonstrates a mixed security posture. On the positive side, it shows good practices by exclusively using prepared statements for SQL queries and implementing nonce and capability checks on its entry points. The lack of known CVEs and a history of vulnerabilities suggests a generally stable and likely well-maintained codebase, at least in terms of publicly disclosed issues. However, there are significant areas of concern.

The static analysis reveals a critical risk associated with the use of the `unserialize()` function, which is a known vector for remote code execution vulnerabilities if not handled with extreme care. Compounding this, the taint analysis indicates one flow with an unsanitized path, specifically identified as having high severity. This, combined with a concerningly low rate of proper output escaping (43%), means that data processed by the plugin could potentially be manipulated and lead to cross-site scripting (XSS) or other injection attacks.

While the plugin has a small attack surface and no directly unprotected entry points, the presence of `unserialize()` and the high-severity unsanitized taint flow are significant weaknesses that require immediate attention. The absence of historical vulnerabilities is a positive indicator, but it does not negate the risks identified in the current code analysis. Developers should prioritize addressing the identified taint flow and securely handling any data passed to `unserialize()`.

Key Concerns

  • Dangerous function unserialize() used
  • Taint analysis: 1 high severity unsanitized path
  • Output escaping: only 43% properly escaped
Vulnerabilities
None known

rng-isuc Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

rng-isuc Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

rng-isuc Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
44
33 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$post_viewed_array = (array) unserialize($posts_viewed);includes/class.controller.isuc.php:102

Output Escaping

43% escaped77 total outputs
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
<class.controller.isuc> (includes/class.controller.isuc.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

rng-isuc Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[isuc_posts_viewed] includes/class.controller.isuc.php:21
WordPress Hooks 9
actiontemplate_redirectincludes/class.controller.isuc.php:22
actionwp_footerincludes/class.controller.isuc.php:24
actionadmin_menuincludes/class.controller.settings.php:16
actionadmin_initincludes/class.controller.settings.php:17
actionadmin_noticesincludes/class.controller.settings.php:18
actionadmin_initincludes/class.controller.settings.php:19
actionplugins_loadedincludes/class.init.php:24
actionwp_enqueue_scriptsincludes/class.init.php:25
actionwidgets_initincludes/widgets/last-post-viewed.php:154
Maintenance & Trust

rng-isuc Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMay 8, 2019
PHP min version
Downloads947

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

rng-isuc Developer Profile

Abolfazl Sabagh

4 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect rng-isuc

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rng-isuc/public/js/uc-last-post-viewed.js/wp-content/plugins/rng-isuc/public/js/uc-last-post-viewed-sidenav.js/wp-content/plugins/rng-isuc/public/css/uc-last-post-viewed.css
Script Paths
/wp-content/plugins/rng-isuc/public/js/uc-last-post-viewed.js/wp-content/plugins/rng-isuc/public/js/uc-last-post-viewed-sidenav.js
Version Parameters
rng-isuc/public/js/uc-last-post-viewed.js?ver=rng-isuc/public/js/uc-last-post-viewed-sidenav.js?ver=rng-isuc/public/css/uc-last-post-viewed.css?ver=

HTML / DOM Fingerprints

CSS Classes
uc-posts-viewed-widgetuc-posts-viewed-shortcodeuc-posts-viewed-sidenav
HTML Comments
<!-- rng-isuc plugin templates start --><!-- rng-isuc plugin templates end -->
Data Attributes
data-rnguc-settingdata-rnguc-post-id
JS Globals
window.uc_ajax_object
Shortcode Output
[isuc_posts_viewed]
FAQ

Frequently Asked Questions about rng-isuc