Thank You NHS Security & Risk Analysis

wordpress.org/plugins/thank-you-nhs

Adding a rainbow cursor and banner to your site to spread hope and say thank you to the NHS and key workers.

10 active installs v1.0 PHP 5.6+ WP 4.5.0+ Updated May 5, 2020
bannercursornhsthank-youthank-you-nhs
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Thank You NHS Safe to Use in 2026?

Generally Safe

Score 85/100

Thank You NHS has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "thank-you-nhs" plugin version 1.0 exhibits a strong security posture based on the provided static analysis. The absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events, particularly those lacking authentication or permission checks, significantly reduces the plugin's attack surface. Furthermore, the code signals indicate good development practices: no dangerous functions were found, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are common sources of vulnerabilities. The limited output escaping (67% properly escaped) is a minor concern, suggesting a small number of potential cross-site scripting (XSS) vulnerabilities, though the taint analysis found no issues in this regard.

The vulnerability history being completely clear, with zero known CVEs, is a significant positive indicator. This suggests that either the plugin has a history of secure development or it has not been a target for malicious actors. The lack of common vulnerability types further reinforces this positive trend. However, the complete absence of nonce checks and capability checks, while not immediately exploitable due to the limited attack surface, represents a missed opportunity to implement robust security measures that would protect against potential future vulnerabilities or more sophisticated attacks if new entry points were introduced.

In conclusion, the "thank-you-nhs" plugin v1.0 appears to be a secure plugin. Its strengths lie in its minimal attack surface and adherence to secure coding practices concerning SQL and external interactions. The primary area for improvement, though not currently exploited, would be to implement nonce and capability checks on any potential entry points to further harden the plugin against future threats. The limited number of unescaped outputs is also a minor area that could be addressed to achieve a higher level of security.

Key Concerns

  • Limited output escaping
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Thank You NHS Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Thank You NHS Release Timeline

v1.0Current
Code Analysis
Analyzed Apr 16, 2026

Thank You NHS Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped18 total outputs
Attack Surface

Thank You NHS Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionadmin_menuthank-you-nhs.php:15
filterplugin_action_linksthank-you-nhs.php:31
actionadmin_initthank-you-nhs.php:34
filterquery_varsthank-you-nhs.php:46
actionwp_enqueue_scriptsthank-you-nhs.php:47
actiontemplate_redirectthank-you-nhs.php:77
filterquery_varsthank-you-nhs.php:87
actionwp_enqueue_scriptsthank-you-nhs.php:88
actiontemplate_redirectthank-you-nhs.php:118
Maintenance & Trust

Thank You NHS Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 5, 2020
PHP min version5.6
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Thank You NHS Developer Profile

andrewchadwicksl

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Thank You NHS

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/thank-you-nhs/js/script.php

HTML / DOM Fingerprints

CSS Classes
tynhs-rainbow-stylestynhs-rainbow-scripts
Data Attributes
name="thank_you_nhs_settings[float]"name="thank_you_nhs_settings[position]"name="thank_you_nhs_settings[customclass]"
JS Globals
tynhsAddStylestynhsAddScripts
FAQ

Frequently Asked Questions about Thank You NHS