Sitewide Message Security & Risk Analysis

wordpress.org/plugins/sitewide-message

Simply. Display a message at the top of every page on your website. You can change the background colour, text colour and URL location.

100 active installs v0.6 PHP + WP 3.7+ Updated Aug 28, 2014
call-to-actionconversion-ratenotification-barthatbloggerwoocommerce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sitewide Message Safe to Use in 2026?

Generally Safe

Score 85/100

Sitewide Message has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The sitewide-message plugin version 0.6 exhibits several significant security concerns despite having a seemingly small attack surface and no recorded vulnerability history. The static analysis reveals a complete lack of security best practices regarding data handling. Notably, 100% of SQL queries are not using prepared statements, which opens the door to SQL injection vulnerabilities. Furthermore, 0% of output escaping is properly implemented, meaning any data displayed to users, especially if influenced by user input, could lead to Cross-Site Scripting (XSS) attacks.

The absence of nonce checks and capability checks on any potential entry points (though none are explicitly listed as unprotected) is a major red flag. This suggests a blind trust in the user's authenticated state and opens up possibilities for unauthorized actions or information disclosure if any entry points are discovered or added in future versions. The lack of taint analysis results could be due to the limited scope of analysis or the absence of data flows, but the other identified code issues are severe enough to warrant caution.

While the plugin has no known CVEs and no recorded vulnerabilities, this is not indicative of inherent security. It may simply mean the plugin is not widely used, has not been thoroughly audited, or vulnerabilities have not yet been discovered. The current code analysis points to a high risk of common web vulnerabilities. The plugin has a good overall posture in terms of a small attack surface and no known vulnerabilities, but the internal code quality regarding security practices is very poor.

Key Concerns

  • SQL queries without prepared statements
  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Sitewide Message Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sitewide Message Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
9
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped9 total outputs
Attack Surface

Sitewide Message Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionwp_headsitewide-message.php:21
actionadmin_enqueue_scriptssitewide-message.php:81
actionadmin_menusitewide-message.php:92
actionadmin_initsitewide-message.php:95
actionwp_footersitewide-message.php:273
filterbody_classsitewide-message.php:320
Maintenance & Trust

Sitewide Message Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedAug 28, 2014
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Sitewide Message Developer Profile

Danny159

2 plugins · 160 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sitewide Message

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sitewide-message/script.js

HTML / DOM Fingerprints

CSS Classes
tb_notification_bartb_fadeInDowntb_inner_bartb_specific_textcustom-msg
Data Attributes
data-default-color
FAQ

Frequently Asked Questions about Sitewide Message