SubHeading Security & Risk Analysis

wordpress.org/plugins/subheading

Adds the ability to easily add and display a sub title/heading on any public post type.

1K active installs v1.8.1 PHP + WP 3.2.1+ Updated Nov 28, 2017
adminheadingsubtemplatetitle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SubHeading Safe to Use in 2026?

Generally Safe

Score 85/100

SubHeading has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "subheading" plugin v1.8.1 exhibits a generally strong security posture based on the static analysis and vulnerability history provided. The complete absence of detected dangerous functions, raw SQL queries, file operations, and external HTTP requests is highly commendable. Furthermore, the high percentage of properly escaped output (91%) and the presence of nonce and capability checks indicate good development practices for protecting against common web vulnerabilities. The lack of any recorded CVEs, past or present, further reinforces this positive assessment, suggesting a mature and well-maintained codebase.

However, the analysis of entry points is a significant concern. The total absence of AJAX handlers, REST API routes, shortcodes, and cron events, while seemingly good, can also indicate a limited plugin functionality or, more critically, that the plugin might not be performing any essential tasks or interacting with the WordPress core in ways that would necessitate these common entry points. The absence of taint analysis flows is also notable; while this could mean the code is secure, it might also suggest that the analysis environment or tooling did not find sufficient complex data flows to analyze, which could mask potential issues if the plugin were to evolve with more complex user input handling.

In conclusion, "subheading" v1.8.1 appears to be a secure plugin with strong internal coding practices. Its vulnerability history is clean, and the static analysis reveals minimal risk. The primary area of potential concern lies in the extremely limited attack surface and the lack of observable taint flows, which warrants further investigation into the plugin's actual functionality and how it handles any potential user-supplied data, however minimal.

Vulnerabilities
None known

SubHeading Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

SubHeading Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
30 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

91% escaped33 total outputs
Attack Surface

SubHeading Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 11
actionadmin_menusubheading.php:48
actionsave_postsubheading.php:49
actionadmin_initsubheading.php:50
actionadmin_enqueue_scriptssubheading.php:51
filterplugin_row_metasubheading.php:52
filterthe_title_rsssubheading.php:56
filterthe_subheadingsubheading.php:57
filterthe_contentsubheading.php:58
actionposts_where_requestsubheading.php:60
actionplugins_loadedsubheading.php:63
filterposts_join_requestsubheading.php:521
Maintenance & Trust

SubHeading Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedNov 28, 2017
PHP min version
Downloads65K

Community Trust

Rating84/100
Number of ratings11
Active installs1K
Developer Profile

SubHeading Developer Profile

Steve

4 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SubHeading

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/subheading/admin.js
Script Paths
/wp-content/plugins/subheading/admin.js

HTML / DOM Fingerprints

JS Globals
SubHeading
FAQ

Frequently Asked Questions about SubHeading