Author Widget Security & Risk Analysis

wordpress.org/plugins/stylish-top-author-widget

Show your Blog author list in Cool Styles & more features

10 active installs v2.0 PHP + WP 3.0+ Updated Unknown
awesomecss3fontawesome-integratedhtml5visual
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Author Widget Safe to Use in 2026?

Generally Safe

Score 100/100

Author Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plugin "stylish-top-author-widget" v2.0 presents a mixed security posture. On the positive side, the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and has no recorded vulnerability history, suggesting a generally stable and well-maintained codebase. Furthermore, the static analysis reveals no identified taint flows, suggesting that the handling of user-supplied data is likely robust.

However, significant concerns arise from the static analysis. The presence of the `create_function` dangerous function is a critical security risk, as it can be exploited to inject and execute arbitrary PHP code if user input is not strictly validated before being passed to it. Additionally, a very low percentage (13%) of output escaping is concerning, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities, particularly as the plugin lacks explicit nonce and capability checks on its potential entry points. While there are no immediate exploitable entry points listed, the identified code quality issues pose a substantial threat if any user-controllable data reaches these problematic functions or unescaped outputs.

In conclusion, while the plugin has a clean vulnerability history and handles SQL safely, the identified use of `create_function` and the pervasive lack of output escaping are serious security weaknesses. These issues, coupled with the absence of nonce and capability checks, create a substantial risk profile that requires immediate attention and remediation.

Key Concerns

  • Presence of dangerous function 'create_function'
  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Author Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Author Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
33
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("alwp");'));widget.php:144

Output Escaping

13% escaped38 total outputs
Attack Surface

Author Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menufunction.php:3
actionadmin_initfunction.php:11
actioninitwidget.php:8
actionwidgets_initwidget.php:144
Maintenance & Trust

Author Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Author Widget Developer Profile

Obaid Hossain

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Author Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/stylish-top-author-widget/css/visual.css

HTML / DOM Fingerprints

CSS Classes
alwp_visualicon-alwp
Data Attributes
id="alwp"class="icon-
FAQ

Frequently Asked Questions about Author Widget