Virus Finder Security & Risk Analysis

wordpress.org/plugins/virus-finder

Find viruses in your WordPress easily. Virus scan, malware finder.

100 active installs v1.0.36 PHP + WP 2.8+ Updated Jan 16, 2026
login-securitysecuresecuritysecurity-pluginwordpress-security
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Virus Finder Safe to Use in 2026?

Generally Safe

Score 100/100

Virus Finder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "virus-finder" plugin, v1.0.36, exhibits a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs) and demonstrates good practices by using prepared statements for all its SQL queries. It also has a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events identified.

However, significant concerns arise from the static analysis. The plugin shows a complete lack of output escaping, meaning user-controlled data displayed on the frontend could be vulnerable to cross-site scripting (XSS) attacks. Furthermore, the taint analysis reveals two flows with unsanitized paths, indicating potential for insecure data handling. The plugin also performs a high volume of file operations (54) with only one nonce check and zero capability checks, raising questions about the security of these file interactions, especially if they involve user-supplied data.

Given the absence of historical vulnerabilities, the plugin has not been a target or has been diligently maintained. Nonetheless, the static analysis findings, particularly the unescaped output and unsanitized paths, represent immediate risks that require attention. The plugin's strengths in SQL handling and limited attack surface are overshadowed by these critical weaknesses in data sanitization and output handling.

Key Concerns

  • 0% output escaping
  • 2 flows with unsanitized paths
  • 0 capability checks
  • High number of file operations (54)
Vulnerabilities
None known

Virus Finder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Virus Finder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
54
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
virus_finder_mappakolvas (virus-finder.php:291)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Virus Finder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuvirus-finder.php:20
actionadmin_initvirus-finder.php:21
Maintenance & Trust

Virus Finder Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedJan 16, 2026
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Virus Finder Developer Profile

wphospital.hu

1 plugin · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Virus Finder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/virus-finder/style/style.css/wp-content/plugins/virus-finder/style/script.js/wp-content/plugins/virus-finder/style/tolt.gif
Script Paths
/wp-content/plugins/virus-finder/style/script.js
Version Parameters
virus-finder/style.css?ver=virus-finder/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
noticenotice-errorLoginhibasearchcsfste+13 more
HTML Comments
<!-- Virus Finder -->
Data Attributes
id="keret"id="hiba"id="search"id="cs"id="fs"id="te"+11 more
JS Globals
var filenamewindow.filename
FAQ

Frequently Asked Questions about Virus Finder