Spam Free Security & Risk Analysis

wordpress.org/plugins/spam-free

Get your Wordpress Blog Spam-Free with this plugin.

100 active installs v1.0 PHP + WP 2.1.0+ Updated Jul 2, 2012
anti-spamcommentshiddensecurespam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Spam Free Safe to Use in 2026?

Generally Safe

Score 85/100

Spam Free has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "spam-free" plugin v1.0 exhibits a mixed security posture. On the positive side, the static analysis reveals a remarkably clean codebase regarding common attack vectors. There are no detected AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the plugin's attack surface. Furthermore, all detected SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, indicating good security practices in these areas. The absence of known CVEs and any vulnerability history further contributes to a seemingly stable profile.

However, a significant concern arises from the output escaping analysis, where 100% of the detected outputs are not properly escaped. This represents a potential cross-site scripting (XSS) vulnerability, as user-supplied data could be injected and executed within the browser. Additionally, the taint analysis shows two flows with unsanitized paths, and while they did not reach a critical or high severity level in this analysis, the presence of such flows warrants careful investigation. The lack of any nonce or capability checks on entry points, although the entry points are currently zero, means that if any were introduced in future updates, they might be implemented without proper security controls.

In conclusion, while the plugin demonstrates strong defensive coding in many common areas and has no prior vulnerability history, the unescaped output is a critical flaw that exposes users to XSS attacks. The taint analysis findings, though not immediately critical, also highlight potential areas for improvement in input sanitization. The absence of security checks like nonces and capabilities, while not a direct risk given the current attack surface, is a weakness that could become problematic if the plugin evolves.

Key Concerns

  • Outputs not properly escaped
  • Taint flows with unsanitized paths
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Spam Free Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Spam Free Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
antispamcheck (index.php:34)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Spam Free Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioncomment_formindex.php:11
actionwp_loadedindex.php:12
actioninitindex.php:13
Maintenance & Trust

Spam Free Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedJul 2, 2012
PHP min version
Downloads22K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Spam Free Developer Profile

pekeltje

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Spam Free

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/spam-free/css/style.css
Version Parameters
spam-free/css/style.css?ver=

HTML / DOM Fingerprints

Shortcode Output
<input type="hidden" name="secure1" value="<input type="hidden" name="secure2" value="
FAQ

Frequently Asked Questions about Spam Free