Voce Widget Cache Security & Risk Analysis

wordpress.org/plugins/voce-widget-cache

Easily cache widget output for better performance.

100 active installs v1.5.2 PHP + WP 3.3+ Updated Jan 5, 2015
widget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Voce Widget Cache Safe to Use in 2026?

Generally Safe

Score 85/100

Voce Widget Cache has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The voce-widget-cache plugin v1.5.2 exhibits a mixed security posture. On the positive side, it has zero known CVEs, an absence of external HTTP requests, file operations, and SQL queries that do not use prepared statements, all of which are excellent security practices. Furthermore, the static analysis shows no identified vulnerabilities in taint flows, indicating that data is likely handled securely within the analyzed code paths.

However, significant concerns arise from the code signals. The presence of the `create_function` is a critical red flag, as it is notoriously insecure and can be exploited for code injection. Coupled with this is the fact that 100% of outputs are not properly escaped, creating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The complete lack of nonce and capability checks across all identified entry points (though currently zero) is also worrying, as it suggests a reliance on WordPress's internal checks, which may not be sufficient if new entry points are introduced or existing ones become vulnerable.

Overall, while the plugin demonstrates good practices in certain areas like SQL handling and a lack of known vulnerabilities, the identified code-level weaknesses, particularly `create_function` and unescaped output, pose a substantial risk. The absence of any previously recorded vulnerabilities could be due to a small user base, infrequent updates, or simply good luck. The plugin needs immediate attention to address the identified code security flaws to improve its overall security.

Key Concerns

  • Use of create_function
  • Unescaped output detected
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Voce Widget Cache Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Voce Widget Cache Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( "$hook", create_function( '', "Voce_Widget_Cache::GetInstance()->delete_cached_widgets('voce-widget-cache.php:81

Output Escaping

0% escaped1 total outputs
Attack Surface

Voce Widget Cache Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitvoce-widget-cache.php:31
Maintenance & Trust

Voce Widget Cache Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedJan 5, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs100
Developer Profile

Voce Widget Cache Developer Profile

Kevin Langley Jr.

4 plugins · 1K total installs

80
trust score
Avg Security Score
80/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Voce Widget Cache

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Voce Widget Cache