RSSupplement Security & Risk Analysis

wordpress.org/plugins/rssupplement

Adds WP functions, copyright, and more to your RSS feed items.

10 active installs v16.07 PHP + WP 3.0+ Updated Jun 8, 2016
atomfeedrdfrssrss2
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RSSupplement Safe to Use in 2026?

Generally Safe

Score 85/100

RSSupplement has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "rssupplement" v16.07 plugin exhibits a surprisingly strong security posture in many key areas. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code signals indicate no dangerous functions were found, all SQL queries use prepared statements, and there are no file operations or external HTTP requests, which are all excellent security practices.

However, a significant concern arises from the output escaping results. With 2 total outputs and 0% properly escaped, this indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered to the user interface without proper sanitization or escaping can be exploited by attackers to inject malicious scripts. The lack of nonce and capability checks, while not directly causing vulnerabilities in this specific analysis due to the limited attack surface, suggests a potential weakness if new entry points were introduced in the future without adequate security measures.

The vulnerability history showing zero CVEs is a positive indicator, suggesting the developers have either maintained a secure codebase or haven't had publicly disclosed vulnerabilities. However, this should not be solely relied upon, as the lack of output escaping is a known class of vulnerabilities that is often overlooked. The overall security posture is good due to the limited attack surface and secure database interactions, but the critical flaw in output escaping presents a notable risk that requires immediate attention.

Key Concerns

  • Unescaped output found
  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
Vulnerabilities
None known

RSSupplement Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RSSupplement Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

RSSupplement Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuRSSupplement.php:32
actionadmin_initRSSupplement.php:33
filterthe_excerpt_rssRSSupplement.php:160
filterthe_content_feedRSSupplement.php:163
Maintenance & Trust

RSSupplement Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJun 8, 2016
PHP min version
Downloads9K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

RSSupplement Developer Profile

Jerry Stephens

2 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RSSupplement

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rssupplement/rss.css/wp-content/plugins/rssupplement/rss.js
Script Paths
/wp-content/plugins/rssupplement/rss.js
Version Parameters
rssupplement?ver=rss.js?ver=rss.css?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Copyright 2007 Jerry Stephens (email : migo@wayofthegeek.org) --><!-- This program is free software; you can redistribute it and/or modify --><!-- it under the terms of the GNU General Public License as published by --><!-- the Free Software Foundation; either version 2 of the License, or -->+8 more
Data Attributes
name="rss_settings[cr_text]"name="rss_settings[set_freetext]"id="cr_text"id="set_freetext"
FAQ

Frequently Asked Questions about RSSupplement