URL Params Security & Risk Analysis

wordpress.org/plugins/url-params

Short Code to grab any URL parameter from the Query String and display it or display conditional content.

8K active installs v2.5 PHP + WP 3.0+ Updated Dec 17, 2024
query-stringurlurl-parametersurl-paramsurlparam
92
A · Safe
CVEs total1
Unpatched0
Last CVEApr 25, 2023
Safety Verdict

Is URL Params Safe to Use in 2026?

Generally Safe

Score 92/100

URL Params has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Apr 25, 2023Updated 1yr ago
Risk Assessment

The 'url-params' plugin v2.5 presents a mixed security profile. On the positive side, the static analysis indicates good practices in handling SQL queries, exclusively using prepared statements, and no file operations or external HTTP requests are detected, which reduces certain attack vectors. The absence of critical or high severity taint flows and dangerous functions is also reassuring. However, there are notable areas for concern. The plugin has a history of Cross-site Scripting (XSS) vulnerabilities, with one medium-severity CVE recorded in its past. The static analysis also reveals that 25% of output is not properly escaped, which could potentially lead to XSS if untrusted input is displayed without adequate sanitization, especially given the plugin's history. Furthermore, the lack of nonce checks and capability checks on the identified entry points (shortcodes) is a significant weakness, as it means these functions could be triggered by unauthenticated or unauthorized users. While the attack surface is small and currently lacks unprotected AJAX/REST API endpoints, the existing shortcode entry points are a clear risk.

Key Concerns

  • Unescaped output detected
  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Medium severity CVE in history
Vulnerabilities
1

URL Params Security Vulnerabilities

CVEs by Year

1 CVE in 2023
2023
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2023-0274medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

URL Params <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

Apr 25, 2023 Patched in 2.5 (273d)
Code Analysis
Analyzed Mar 16, 2026

URL Params Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped8 total outputs
Attack Surface

URL Params Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[urlparam] urlparams.php:20
[ifurlparam] urlparams.php:21
WordPress Hooks 3
actionadmin_menuurlparams.php:27
actionadmin_initurlparams.php:28
filterplugin_action_linksurlparams.php:36
Maintenance & Trust

URL Params Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 17, 2024
PHP min version
Downloads101K

Community Trust

Rating100/100
Number of ratings37
Active installs8K
Developer Profile

URL Params Developer Profile

Jeremy B. Shapiro

4 plugins · 8K total installs

71
trust score
Avg Security Score
89/100
Avg Patch Time
273 days
View full developer profile
Detection Fingerprints

How We Detect URL Params

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[urlparam][ifurlparam]
FAQ

Frequently Asked Questions about URL Params