Very Simple Sitemap Security & Risk Analysis

wordpress.org/plugins/very-simple-sitemap

Very simple plugin to help create a basic sitemap page and sitemap xml file.

100 active installs v1.1 PHP + WP 3.2.1+ Updated Dec 7, 2012
pagesitemapsitemapxmlxml
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Very Simple Sitemap Safe to Use in 2026?

Generally Safe

Score 85/100

Very Simple Sitemap has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "very-simple-sitemap" plugin v1.1 exhibits a generally strong security posture based on the provided static analysis. The complete absence of dangerous functions, the exclusive use of prepared statements for SQL queries, and the proper escaping of all outputs are significant strengths. Furthermore, the plugin does not make external HTTP requests and has no recorded vulnerabilities in its history, which is highly encouraging. The limited attack surface, with only one shortcode and no unprotected AJAX handlers or REST API routes, also contributes to its good security.

However, there are a few areas that warrant attention. The plugin's file operations, while not directly flagged as a vulnerability in the static analysis, represent potential entry points that could be exploited if not handled with extreme care. The lack of nonce checks and capability checks on its single entry point (the shortcode) means that any user, regardless of their role or permissions, can trigger its functionality. This could potentially lead to denial-of-service scenarios or unexpected behavior if the shortcode's output is not strictly controlled or if it interacts with other system components in unintended ways.

In conclusion, "very-simple-sitemap" v1.1 demonstrates good coding practices in core areas like SQL and output handling. Its clean vulnerability history is a positive indicator. The primary concerns stem from the lack of robust access control on its shortcode and the presence of file operations without specific details on their implementation. While not critical based on this data alone, these aspects could be leveraged in more complex attack chains.

Key Concerns

  • File operations without specific security checks
  • No nonce checks on shortcode
  • No capability checks on shortcode
Vulnerabilities
None known

Very Simple Sitemap Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Very Simple Sitemap Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0
Attack Surface

Very Simple Sitemap Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[sitemap] very-simple-sitemap.php:44
Maintenance & Trust

Very Simple Sitemap Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedDec 7, 2012
PHP min version
Downloads12K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

Very Simple Sitemap Developer Profile

Roi Dayan

4 plugins · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Very Simple Sitemap

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<h3>Pages</h3><ul><h3>Feeds</h3><ul>
FAQ

Frequently Asked Questions about Very Simple Sitemap