
Roi Calculator Security & Risk Analysis
wordpress.org/plugins/roi-calculatorFor using This plugin you Can Know ratio that compares the gain or loss from an investment relative to its cost.
Is Roi Calculator Safe to Use in 2026?
Generally Safe
Score 99/100Roi Calculator has a strong security track record. Known vulnerabilities have been patched promptly.
The roi-calculator plugin version 1.1 exhibits a generally good security posture due to its adherence to several best practices. The static analysis reveals a minimal attack surface with only one shortcode and no AJAX handlers or REST API routes, and importantly, none of these entry points appear unprotected. The code also demonstrates strong SQL query sanitization, with 100% of queries using prepared statements, and a high percentage of output (98%) being properly escaped, which significantly reduces the risk of common vulnerabilities like SQL injection and cross-site scripting. The absence of file operations and external HTTP requests further strengthens its security.
However, there are a few areas of concern. The complete lack of nonce checks and capability checks across all entry points is a significant weakness. While the current attack surface is small, any future expansion or modification could easily introduce vulnerabilities if these fundamental security mechanisms are not implemented. The vulnerability history indicates a past medium-severity Cross-Site Request Forgery (CSRF) vulnerability. While it is currently patched, the presence of such a vulnerability suggests that the plugin's development might not consistently incorporate robust security checks, particularly for state-changing operations that are susceptible to CSRF. The taint analysis showing zero flows analyzed is also a missed opportunity for deeper security assurance.
In conclusion, roi-calculator v1.1 benefits from a small attack surface and good practices in SQL and output sanitization. However, the absence of nonce and capability checks represents a notable oversight that could expose the plugin to risks, especially if its functionality expands. The past CSRF vulnerability serves as a reminder to ensure comprehensive security across all actions.
Key Concerns
- Missing nonce checks
- Missing capability checks
- Past medium severity CVE (CSRF)
- Taint analysis not performed
Roi Calculator Security Vulnerabilities
CVEs by Year
Severity Breakdown
1 total CVE
Roi Calculator <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Roi Calculator Code Analysis
Output Escaping
Roi Calculator Attack Surface
Shortcodes 1
WordPress Hooks 5
Maintenance & Trust
Roi Calculator Maintenance & Trust
Maintenance Signals
Community Trust
Roi Calculator Developer Profile
10 plugins · 850 total installs
How We Detect Roi Calculator
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/roi-calculator/frontend/asset/css/style.css/wp-content/plugins/roi-calculator/frontend/asset/js/script.js/wp-content/plugins/roi-calculator/frontend/asset/js/chart.js/wp-content/plugins/roi-calculator/frontend/asset/js/script.js/wp-content/plugins/roi-calculator/frontend/asset/js/chart.jsroi-calculator/frontend/asset/js/script.js?ver=roi-calculator/frontend/asset/css/style.css?ver=HTML / DOM Fingerprints
roi_containers_rowsroi_inner_headerroi_invt_formroi_calc_heading_1roi_calc_colroi_field_namecalc_conditionsroi_calc_filed+11 moreroi_calc_styleroi_calc_style<section class="roi_calc_header"><div class="roi_title"><div class="roi_inner_header"><h2 class="font-weight-bold">