Alex Set Favicon Security & Risk Analysis

wordpress.org/plugins/set-favicon

Alex Set Favicon allows any user to easily set and update their favicon. See http://anthony.strangebutfunny.net/my-plugins/alex-set-favicon/ for help

30 active installs v8.0 PHP + WP 3.5.1+ Updated May 7, 2013
favicongeneratorhellomulti-siteset
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Alex Set Favicon Safe to Use in 2026?

Generally Safe

Score 85/100

Alex Set Favicon has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "set-favicon" v8.0 plugin exhibits a mixed security posture. On the positive side, there are no recorded vulnerabilities (CVEs) and the plugin demonstrates good practice by using prepared statements for all SQL queries. The static analysis also indicates a small attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and no external HTTP requests or file operations. However, a significant concern arises from the "Output escaping" analysis, which shows that 100% of its three outputs are not properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data or dynamic content is displayed without proper sanitization. Furthermore, the taint analysis reveals two flows with "unsanitized paths," which, while not classified as critical or high severity, warrant attention as they indicate potential pathways for malicious input to reach sensitive parts of the code. The complete absence of nonce and capability checks on the identified entry points, though minimal, is also a weakness that could be exploited in conjunction with other potential vulnerabilities.

Key Concerns

  • All outputs are unescaped
  • Unsanitized paths found in taint analysis
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Alex Set Favicon Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Alex Set Favicon Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
alex_set_favicon_admin (set-favicon.php:30)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Alex Set Favicon Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_headset-favicon.php:17
actionwp_headset-favicon.php:20
actionlogin_headset-favicon.php:21
actionadmin_headset-favicon.php:22
actionadmin_menuset-favicon.php:23
Maintenance & Trust

Alex Set Favicon Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMay 7, 2013
PHP min version
Downloads7K

Community Trust

Rating50/100
Number of ratings2
Active installs30
Developer Profile

Alex Set Favicon Developer Profile

Anthony

6 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Alex Set Favicon

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
http://mrstats.strangebutfunny.net/statsscript.php

HTML / DOM Fingerprints

CSS Classes
wrap
HTML Comments
<!-- Begin Alex Favicon --><!-- End Alex Favicon -->
Data Attributes
name="alex_favicon"name="alex_favicon_value"
FAQ

Frequently Asked Questions about Alex Set Favicon