Unfeature Security & Risk Analysis

wordpress.org/plugins/unfeature

Simply associates a checkbox with the featured image, allowing it to be skipped on single posts.

10 active installs v0.1 PHP + WP 3.8+ Updated Apr 18, 2014
featured-imagethumbnail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Unfeature Safe to Use in 2026?

Generally Safe

Score 85/100

Unfeature has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "unfeature" plugin v0.1 exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, SQL queries requiring sanitation, or unescaped output demonstrates adherence to core WordPress security best practices. Furthermore, the plugin has no recorded vulnerability history, indicating a history of secure development or a lack of prior exploitation. The zero attack surface through AJAX, REST API, shortcodes, and cron events is a significant strength, as it minimizes potential entry points for attackers. The single capability check, while present, suggests a limited functionality that may not require extensive authorization checks.

However, the complete lack of taint analysis data (0 flows analyzed) is a notable concern. While the static analysis did not find any explicit issues, it also means that potential flows of unsanitized data through the plugin's code have not been thoroughly examined. This could leave the plugin vulnerable to attack vectors that are not apparent through basic function checks. The absence of nonce checks, while not explicitly flagged as a vulnerability given the lack of an attack surface, is a standard security measure for any interactive plugin functionality and its absence warrants caution.

In conclusion, "unfeature" v0.1 appears to be a secure plugin with a clean bill of health from static analysis and vulnerability history. Its minimal attack surface and proper handling of SQL and output are commendable. The primary weakness lies in the unexplored taint flows and the absence of nonce checks, which, while not currently exploitable due to the lack of entry points, could become liabilities if the plugin's functionality or attack surface expands in future versions. Developers should consider implementing comprehensive taint analysis and nonce checks as a proactive security measure.

Key Concerns

  • No nonce checks found
  • No taint analysis performed
Vulnerabilities
None known

Unfeature Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Unfeature Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Unfeature Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Unfeature Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filteradmin_post_thumbnail_htmlunfeature.php:22
actionpost_updatedunfeature.php:23
filterpost_thumbnail_htmlunfeature.php:24
Maintenance & Trust

Unfeature Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 18, 2014
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Unfeature Developer Profile

Grant Mangham

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Unfeature

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
unfeature-image
HTML Comments
<!-- Unfeatured image -->
Data Attributes
name="unfeature_image"
FAQ

Frequently Asked Questions about Unfeature