To-Dos Security & Risk Analysis

wordpress.org/plugins/to-dos

Add simple To-Dos to your Wordpress Dashboard. Help yourself remember what you're working on and what you should do next.

20 active installs v1.0 PHP + WP 2.7+ Updated Sep 17, 2009
dashboardnotespost-itto-do
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is To-Dos Safe to Use in 2026?

Generally Safe

Score 85/100

To-Dos has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "to-dos" plugin v1.0 demonstrates a generally strong security posture from a static analysis perspective, with no identified dangerous functions, SQL injection vulnerabilities, or file operations. The absence of external HTTP requests and the complete reliance on prepared statements for SQL queries are positive indicators. However, a critical concern emerges from the "Output escaping" signal, where 100% of the identified outputs are not properly escaped. This suggests a significant risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts through user-generated or plugin-generated output that is not sanitized before being displayed to other users or administrators. The plugin's lack of any recorded vulnerability history could indicate either a lack of past scrutiny or genuinely effective security practices, but the present unescaped output poses a clear and present danger.

While the plugin appears to have a limited attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without authorization checks, this doesn't mitigate the immediate risk of XSS. The complete absence of nonce and capability checks across all identified entry points (though there are none listed) is noted, but the more pressing issue is the unescaped output. In conclusion, the "to-dos" plugin v1.0 has strengths in its foundational code practices regarding SQL and external requests, but the pervasive lack of output escaping represents a major weakness that requires immediate attention to prevent potential XSS attacks. The vulnerability history is a positive sign, but it cannot override the concrete findings of the static analysis.

Key Concerns

  • All identified outputs are unescaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

To-Dos Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

To-Dos Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

To-Dos Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitto-dos.php:109
actionwp_dashboard_setupto-dos.php:110
Maintenance & Trust

To-Dos Maintenance & Trust

Maintenance Signals

WordPress version tested2.8.4
Last updatedSep 17, 2009
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

To-Dos Developer Profile

swedish boy

3 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect To-Dos

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
button
Data Attributes
name="dashboard_todos"id="todos_submit"
Shortcode Output
<script language="javascript"> function todo_update() { document.dashboard_todos.submit(); } </script> <form name="dashboard_todos" method="post"> <input type="hidden" name="todo_action" value="1">
FAQ

Frequently Asked Questions about To-Dos