Stella Flags Widget Security & Risk Analysis

wordpress.org/plugins/stella-flags

Plugin creates language selector widget with country flags for the Stella plugin.

20 active installs v1.0 PHP + WP 3.0+ Updated Unknown
flagslanguageslocalizationwidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stella Flags Widget Safe to Use in 2026?

Generally Safe

Score 100/100

Stella Flags Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The Stella Flags plugin v1.0 exhibits a mixed security posture. On the positive side, it demonstrates good practices by having zero known CVEs, a complete absence of SQL queries (thus no risk of SQL injection via prepared statements), no file operations, and no external HTTP requests. The attack surface also appears to be zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, and notably, no unprotected entry points. However, significant concerns arise from the code analysis. The presence of `create_function` is a direct indicator of a potential security risk due to its inherent vulnerabilities. Furthermore, 100% of output is unescaped, presenting a high risk of Cross-Site Scripting (XSS) vulnerabilities where user-supplied data could be injected into the page and executed in the user's browser. The lack of any nonce or capability checks also means that if any functionality were to be added in the future, it would likely be unprotected.

While the plugin has no recorded vulnerability history, this does not automatically imply security. It could simply mean the plugin hasn't been a target or that past vulnerabilities were not publicly disclosed. The critical issues found in the static analysis, specifically the use of `create_function` and universally unescaped output, are significant weaknesses that outweigh the current lack of known vulnerabilities and zero attack surface. These issues necessitate immediate attention to mitigate potential risks, particularly XSS and arbitrary code execution if `create_function` is used with untrusted input.

Key Concerns

  • Use of dangerous function: create_function
  • Output escaping: 0% properly escaped
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Stella Flags Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Stella Flags Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'register_widget( "Stella_Flags" );' ));stella-flags.php:54

Output Escaping

0% escaped4 total outputs
Attack Surface

Stella Flags Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initstella-flags.php:54
actionwp_enqueue_scriptsstella-flags.php:58
Maintenance & Trust

Stella Flags Widget Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Stella Flags Widget Developer Profile

rafallach

1 plugin · 20 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stella Flags Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stella-flags/css/styles.css
Version Parameters
stella_flags/css/styles.css?ver=

HTML / DOM Fingerprints

CSS Classes
flags
FAQ

Frequently Asked Questions about Stella Flags Widget