Simple Testimonial Security & Risk Analysis

wordpress.org/plugins/simple-testimonial

Simple Testimonial is plugin for testimonial, where you can add testimonial same as post.

10 active installs v1.0 PHP + WP 3.2+ Updated Unknown
commentsspamtestimonial
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Testimonial Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Testimonial has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "simple-testimonial" v1.0 plugin exhibits a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no direct SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The absence of known vulnerabilities in its history is also a strong indicator of good past security practices. However, significant concerns arise from the lack of output escaping and the complete absence of nonce and capability checks across all entry points, including the single shortcode.

The code analysis highlights that 100% of the identified outputs are not properly escaped. This presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected through user-provided testimonial data and executed in other users' browsers. The complete lack of nonce and capability checks means that any user, regardless of their role or privileges, could potentially interact with or manipulate the plugin's functionality through its shortcode, opening doors for unauthorized actions. The zero taint flows and zero critical/high severity code signals are reassuring, but they do not mitigate the immediate risks posed by unescaped output and lack of authorization checks.

Overall, while the plugin avoids several common pitfalls like direct SQL injection or bundled vulnerable libraries, the critical oversight in output escaping and authorization checks creates a significant attack surface for XSS and potential unauthorized manipulation. The vulnerability history is clean, which is a positive sign, but it doesn't excuse the present security flaws in the current version. A balanced conclusion is that the plugin has a solid foundation in avoiding certain types of vulnerabilities but suffers from critical oversights in user input handling and authorization, demanding immediate attention.

Key Concerns

  • Unescaped output
  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

Simple Testimonial Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Testimonial Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Simple Testimonial Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[show_testimonial] simple-testimonial.php:96
WordPress Hooks 1
actioninitsimple-testimonial.php:95
Maintenance & Trust

Simple Testimonial Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Simple Testimonial Developer Profile

nitinmaurya12

5 plugins · 110 total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Testimonial

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
alignleft
Shortcode Output
<div class="entry-content"><img src="" class="alignleft"/></div>
FAQ

Frequently Asked Questions about Simple Testimonial