Simple Iframe Buster Security & Risk Analysis

wordpress.org/plugins/simple-iframe-buster

Provides a method of setting the X-Frame-Options header to SAMEORIGIN. Also enqueues a javascript based iframe blocker.

100 active installs v1.1.1 PHP + WP 3.9+ Updated Aug 13, 2021
http-headersiframex-frame-options
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Simple Iframe Buster Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Iframe Buster has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'simple-iframe-buster' plugin v1.1.1 appears to have a strong security posture. The static analysis reveals no apparent attack surface, dangerous functions, raw SQL queries, unescaped output, or file operations. Taint analysis also indicates a clean codebase with no identified vulnerabilities or unsanitized flows. The absence of any recorded vulnerabilities in its history further strengthens this assessment, suggesting a history of secure development and maintenance.

While the plugin exhibits excellent security practices in its current version, it's important to note that the analysis did not identify any capability checks or nonce checks on potential entry points (though none were found). This is a minor point of concern, as a more robust implementation might defensively include these checks even if no immediate attack surface is apparent. However, the overall lack of entry points mitigates this risk significantly. The plugin's strengths lie in its minimalist design and adherence to secure coding principles for the features it does implement.

In conclusion, the 'simple-iframe-buster' plugin v1.1.1 demonstrates a very low risk profile. Its clean code, lack of known vulnerabilities, and minimal attack surface are all positive indicators. The absence of any deductions reflects the robust security demonstrated in the provided data.

Vulnerabilities
None known

Simple Iframe Buster Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Iframe Buster Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Simple Iframe Buster Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitplugin.php:60
actionsend_headersplugin.php:63
actionwp_enqueue_scriptsplugin.php:64
Maintenance & Trust

Simple Iframe Buster Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedAug 13, 2021
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Simple Iframe Buster Developer Profile

Mikel King

2 plugins · 500 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Iframe Buster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-iframe-buster/js/iframe-buster.js
Script Paths
/wp-content/plugins/simple-iframe-buster/js/iframe-buster.js
Version Parameters
simple-iframe-buster/js/iframe-buster.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Simple Iframe Buster