Stand With Ukraine Security & Risk Analysis

wordpress.org/plugins/stand-with-ukraine

Displays a banner and link on your site to show your support for Ukraine. Styles are output inline for performance reasons, but can be filtered using …

10 active installs v1.0.5 PHP 5.6+ WP 4.6+ Updated Mar 8, 2022
standwithukraine
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Stand With Ukraine Safe to Use in 2026?

Generally Safe

Score 85/100

Stand With Ukraine has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "stand-with-ukraine" plugin v1.0.5 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL injection vulnerabilities (all queries are prepared), file operations, external HTTP requests, and a clean taint analysis report are all positive indicators. Furthermore, the plugin appears to have a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. The vulnerability history also shows no recorded CVEs, suggesting a well-maintained and secure development practice to date.

However, there are a couple of areas that warrant attention. The lack of nonce checks and capability checks across all entry points, while currently having zero entry points, indicates a potential weakness if the attack surface were to expand in future versions without corresponding security checks being implemented. Additionally, a significant portion of the output (25%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not handled carefully. While the current lack of vulnerabilities is commendable, the potential for XSS and the absence of authorization checks on potential future entry points are areas that require vigilance.

In conclusion, the "stand-with-ukraine" plugin is currently in a good security state, with no critical vulnerabilities identified. Its proactive approach to SQL security and minimal attack surface are strengths. The primary concerns lie in the potential for XSS due to unescaped output and the lack of explicit authorization checks, which, while not currently exploitable, represent risks that should be addressed to maintain a robust security profile.

Key Concerns

  • 25% of output not properly escaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Stand With Ukraine Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Stand With Ukraine Release Timeline

v1.0.5Current
v1.0.4
v1.0.3
v1.0.2
v1.0.1
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Stand With Ukraine Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

Stand With Ukraine Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptsstand-with-ukraine.php:21
actionwp_headstand-with-ukraine.php:46
Maintenance & Trust

Stand With Ukraine Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 8, 2022
PHP min version5.6
Downloads1K

Community Trust

Rating100/100
Number of ratings6
Active installs10
Developer Profile

Stand With Ukraine Developer Profile

Jonathan Bossenger

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stand With Ukraine

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stand-with-ukraine/stand_with_ukraine.js
Script Paths
/wp-content/plugins/stand-with-ukraine/stand_with_ukraine.js
Version Parameters
stand-with-ukraine/stand_with_ukraine.js?ver=

HTML / DOM Fingerprints

JS Globals
swu_options
Shortcode Output
<style> #stand_with_ukraine_overlay { border: 10px solid #0057B8; padding: 5px; text-align: center; text-combine: #0057B8; background-color: #FFD700; } #stand_with_ukraine_overlay a { display: inline-block; padding: 3px 6px; color: #0057B8; border: 2px transparent dashed; text-decoration: underline; } #stand_with_ukraine_overlay a:hover, #stand_with_ukraine_overlay a:focus { border: 2px #0057B8 dashed; text-decoration: underline; } </style>
FAQ

Frequently Asked Questions about Stand With Ukraine