SmugBuy Security & Risk Analysis

wordpress.org/plugins/smugbuy

A plugin to automatically insert SmugMug "buy" links into wordpress posts and pages using a shortcode.

10 active installs v1.1.5 PHP + WP 2.8+ Updated Jan 12, 2012
photograhphotographerphotographsphotographysmugmug
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SmugBuy Safe to Use in 2026?

Generally Safe

Score 85/100

SmugBuy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The smugbuy plugin v1.1.5 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The complete absence of known CVEs and a clean record of past vulnerabilities is a significant positive indicator, suggesting a commitment to security by the developers or a lack of discovery of issues.

However, there are areas for concern within the code analysis. The fact that 38% of output escaping is not properly handled presents a risk of Cross-Site Scripting (XSS) vulnerabilities, especially if this unescaped output is user-controllable. Furthermore, the complete lack of nonce checks and capability checks across all entry points, including the single shortcode identified, is a critical oversight. This means that potentially any user, regardless of their role or permissions, could trigger the functionality associated with the shortcode, leading to unauthorized actions or information disclosure.

While the plugin does not have external HTTP requests, file operations, or dangerous functions, the identified issues with output escaping and the complete absence of authorization checks are significant weaknesses. The controlled attack surface is a strength, but its lack of protection is a major concern. The plugin's security is a mixed bag, with a clean history but concerning implementation details that require attention.

Key Concerns

  • Significant unescaped output (38%)
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

SmugBuy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SmugBuy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

62% escaped21 total outputs
Attack Surface

SmugBuy Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[smugbuy] smugbuy.php:130
WordPress Hooks 3
filterplugin_action_linkssmugbuy.php:35
actionwp_print_stylessmugbuy.php:56
actionadmin_menusmugbuy.php:135
Maintenance & Trust

SmugBuy Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 12, 2012
PHP min version
Downloads4K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

SmugBuy Developer Profile

chrismartino

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SmugBuy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/smugbuy/smugbuy.css

HTML / DOM Fingerprints

CSS Classes
smugbuy_gallerysmugbuy_photo
Data Attributes
name="smugbuy_text"id="smugbuy_text"name="smugbuy_gtext"id="smugbuy_gtext"name="smugbuy_dsize"id="smugbuy_dsize"+2 more
Shortcode Output
<a href='' class="smugbuy_gallery"' class="smugbuy_photo"<img src='
FAQ

Frequently Asked Questions about SmugBuy