Simple Testimonials Security & Risk Analysis

wordpress.org/plugins/simple-testimonials

Easily manage testimonials and display them anywhere on your blog in seconds, via blocks, widgets or shortcodes.

300 active installs v1.0.7 PHP + WP 3.0.1+ Updated Mar 22, 2023
random-quoterandom-testimonialrandom-testimonialstestimonials
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Simple Testimonials Safe to Use in 2026?

Generally Safe

Score 85/100

Simple Testimonials has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The simple-testimonials plugin v1.0.7 exhibits a generally positive security posture, with no recorded vulnerabilities or critical taint flows. The static analysis reveals good practices such as 100% of SQL queries using prepared statements and the presence of nonce and capability checks. However, a significant concern lies in the output escaping, where only 44% of outputs are properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not adequately sanitized before being displayed in the frontend.

While the plugin boasts a clean vulnerability history, the lack of comprehensive taint analysis (0 flows analyzed) and the observed output escaping issues warrant attention. The single shortcode presents a potential entry point that, combined with insufficient output escaping, could be leveraged by attackers. Given the absence of known CVEs and the generally strong adherence to secure coding principles in other areas, the primary risk is currently related to potential XSS vulnerabilities due to incomplete output sanitization. A deeper dive into the shortcode's functionality and the handling of its output would be beneficial for a complete risk assessment.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

Simple Testimonials Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Simple Testimonials Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
25
20 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped45 total outputs
Attack Surface

Simple Testimonials Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[testimonial] pixelovely_testimonial.php:474
WordPress Hooks 8
actionwp_enqueue_scriptspixelovely_testimonial.php:27
actioninitpixelovely_testimonial.php:79
actionedit_form_after_titlepixelovely_testimonial.php:84
actionsave_postpixelovely_testimonial.php:229
actionwidgets_initpixelovely_testimonial.php:473
actionplugins_loadedpixelovely_testimonial.php:481
actionenqueue_block_editor_assetspixelovely_testimonial.php:494
actioninitpixelovely_testimonial.php:502
Maintenance & Trust

Simple Testimonials Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedMar 22, 2023
PHP min version
Downloads24K

Community Trust

Rating100/100
Number of ratings14
Active installs300
Developer Profile

Simple Testimonials Developer Profile

Kim

3 plugins · 320 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Testimonials

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-testimonials/css/style.css
Version Parameters
simple-testimonials/css/style.css?ver=

HTML / DOM Fingerprints

Data Attributes
name="pix_simple_testimonial_pagemeta_noncename"id="pix_simple_testimonial_pagemeta_noncename"name="_quote"name="post_title"
JS Globals
PIXELovely_simpletestimonials_inputs
FAQ

Frequently Asked Questions about Simple Testimonials