VLW Tabelle Security & Risk Analysis

wordpress.org/plugins/vlw-tabelle

Widgit zur Einbindung einer Tabelle des VLW

10 active installs v1.0 PHP + WP 3.0.1+ Updated Nov 9, 2016
widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is VLW Tabelle Safe to Use in 2026?

Generally Safe

Score 85/100

VLW Tabelle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin "vlw-tabelle" v1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its potential attack surface. Furthermore, the complete absence of dangerous functions, file operations, and external HTTP requests is commendable. The fact that all SQL queries utilize prepared statements is a major strength, mitigating the risk of SQL injection vulnerabilities. The plugin also appears to avoid bundling external libraries, which can often be a source of vulnerabilities if not kept up-to-date.

However, a significant concern arises from the complete lack of output escaping (0% properly escaped). This indicates that any data outputted by the plugin is not being sanitized, making it highly susceptible to Cross-Site Scripting (XSS) attacks. Any dynamic content displayed to users could be manipulated by an attacker to execute malicious JavaScript in the user's browser. Additionally, the complete absence of nonce checks and capability checks, while not directly contributing to the attack surface given its current configuration, means that if any entry points were to be introduced in future versions, they would be unprotected.

The plugin's vulnerability history is clean, with no recorded CVEs. This suggests that in its past, it has not had publicly disclosed vulnerabilities. However, this clean history, coupled with the significant output escaping issue, could indicate that the plugin's functionality might be limited, or that its past development has not sufficiently addressed potential security weaknesses in output handling. In conclusion, while "vlw-tabelle" v1.0 demonstrates strengths in preventing common vulnerabilities like SQL injection and limiting its attack surface, the critical lack of output escaping presents a major security risk that needs immediate attention.

Key Concerns

  • 0% properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

VLW Tabelle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

VLW Tabelle Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
31
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped31 total outputs
Attack Surface

VLW Tabelle Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initvlw_tabelle_widget.php:29
Maintenance & Trust

VLW Tabelle Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedNov 9, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

VLW Tabelle Developer Profile

breakpoint21

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect VLW Tabelle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<table> <tr><th></th><th>Verein</th><th>Spiele</th><th>Sätze</th><th>Ballpunkte</th><th>Punkte</th></tr>
FAQ

Frequently Asked Questions about VLW Tabelle