Scholar Publications Fetcher Security & Risk Analysis

wordpress.org/plugins/scholar-publications-fetcher

A lightweight and high-performance plugin to fetch, cache, and display your Google Scholar publications in a clean, modern, and responsive card layout …

100 active installs v2.2.0 PHP 7.2+ WP 5.2+ Updated Nov 12, 2025
academicpublicationsresearchscholarshortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Scholar Publications Fetcher Safe to Use in 2026?

Generally Safe

Score 100/100

Scholar Publications Fetcher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "scholar-publications-fetcher" v2.2.0 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of dangerous functions, 100% usage of prepared statements for SQL queries, and proper output escaping are all excellent indicators of secure coding practices. Furthermore, the plugin has no recorded vulnerabilities or CVEs, suggesting a history of well-maintained and secure development.

While the static analysis does not reveal any immediate critical flaws like unsanitized taint flows or raw SQL queries, there are areas for potential concern. The lack of nonce checks on its single shortcode entry point, along with a complete absence of capability checks, presents a potential avenue for unauthorized actions if the shortcode's functionality is sensitive. Additionally, the presence of external HTTP requests, though not inherently problematic, always warrants careful scrutiny for potential vulnerabilities related to the external services it interacts with.

Overall, the plugin appears to be developed with security in mind, particularly in its data handling. However, the missing client-side and server-side authorization checks on the shortcode are a notable weakness that could be exploited. The lack of vulnerability history is a positive sign, but it does not completely absolve the plugin from potential future undiscovered issues, especially considering the identified lack of authorization controls.

Key Concerns

  • Missing nonce checks on shortcode
  • Missing capability checks on entry points
Vulnerabilities
None known

Scholar Publications Fetcher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Scholar Publications Fetcher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
0
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

100% prepared5 total queries

Output Escaping

100% escaped21 total outputs
Attack Surface

Scholar Publications Fetcher Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[schopufe_publications] scholar-publications-fetcher.php:70
WordPress Hooks 1
actionwp_enqueue_scriptsscholar-publications-fetcher.php:69
Maintenance & Trust

Scholar Publications Fetcher Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 12, 2025
PHP min version7.2
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Scholar Publications Fetcher Developer Profile

valsze

1 plugin · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Scholar Publications Fetcher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/scholar-publications-fetcher/css/gs-styles.css
Version Parameters
scholar-publications-fetcher/css/gs-styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
gsc_a_trgsc_a_atgs_graygsc_a_hcgsc_oci_descr
Data Attributes
gsc_a_atgsc_a_hcgsc_oci_descr
Shortcode Output
[schopufe_publicationsuser_idcountshow_abstract
FAQ

Frequently Asked Questions about Scholar Publications Fetcher