SuperRSS by Leo Balter Security & Risk Analysis

wordpress.org/plugins/superrss

Totally in Portuguese-Br yet, this add a very customizabole rss or atom feed. Made after the standard wp rss plugin.

10 active installs v1.0 PHP + WP 2.8+ Updated Mar 19, 2010
atomcachefeedrss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is SuperRSS by Leo Balter Safe to Use in 2026?

Generally Safe

Score 85/100

SuperRSS by Leo Balter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'superrss' plugin, version 1.0, presents a mixed security profile. On the positive side, it demonstrates good practices by having zero known CVEs and no recorded vulnerabilities in its history. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, significantly reducing common attack vectors. The plugin also avoids bundled libraries, which can sometimes introduce outdated or vulnerable code.

However, several areas raise concerns. The presence of the `create_function` is a significant red flag, as it can be exploited for code injection. While the total attack surface appears small with zero identified entry points, this analysis might be incomplete without a full audit. A critical issue is the low percentage of properly escaped output (29%), indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities where user-supplied data is displayed back to the user without proper sanitization. The absence of nonce checks on any potential entry points and the single capability check also suggest a potentially weak authorization mechanism if any hidden entry points exist.

In conclusion, while the lack of known vulnerabilities and the secure handling of SQL are strengths, the reliance on `create_function` and the widespread unescaped output are serious weaknesses that could expose users to XSS and potential code execution attacks. This plugin requires immediate attention to address these critical security flaws.

Key Concerns

  • Use of dangerous function create_function
  • Low percentage of properly escaped output
  • No nonce checks on potential entry points
  • Limited capability checks
Vulnerabilities
None known

SuperRSS by Leo Balter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SuperRSS by Leo Balter Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
53
22 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("Super_RSS");'));superrss.php:350

Output Escaping

29% escaped75 total outputs
Attack Surface

SuperRSS by Leo Balter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initsuperrss.php:350
Maintenance & Trust

SuperRSS by Leo Balter Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedMar 19, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

SuperRSS by Leo Balter Developer Profile

leobalter

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SuperRSS by Leo Balter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/superrss/widget.css

HTML / DOM Fingerprints

CSS Classes
rssSummaryrss-date
Data Attributes
widget-superrss
FAQ

Frequently Asked Questions about SuperRSS by Leo Balter