Wayfinder Security & Risk Analysis

wordpress.org/plugins/wayfinder

Easily identify and select blocks in use within the editor.

800 active installs v1.2.0 PHP 5.6+ WP 4.7+ Updated Oct 28, 2024
blockfinderhelperidentifierselector
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wayfinder Safe to Use in 2026?

Generally Safe

Score 92/100

Wayfinder has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "wayfinder" plugin v1.2.0 demonstrates a generally strong security posture based on the provided static analysis. The plugin has a remarkably small attack surface, with no detected AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or permission checks. The code also shows good practices in SQL query handling, exclusively using prepared statements, and a respectable number of capability checks and nonce checks are in place. File operations and external HTTP requests are absent, further reducing potential vulnerabilities.

However, the most significant area of concern lies in output escaping, where only 56% of outputs are properly escaped. This indicates a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data or plugin-generated content is not sufficiently sanitized before being displayed to users. While taint analysis shows no detected unsanitized paths, the low percentage of properly escaped output is a notable weakness.

The plugin's vulnerability history is clean, with no known CVEs, which is a positive sign. This, combined with the limited attack surface and focus on prepared statements, suggests a development team that is likely aware of common WordPress security pitfalls. Despite the clean history, the unescaped output remains the primary risk that should be addressed to further harden the plugin.

Key Concerns

  • Output escaping is not fully implemented
Vulnerabilities
None known

Wayfinder Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Wayfinder Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
5 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

56% escaped9 total outputs
Attack Surface

Wayfinder Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionadmin_menuindex.php:35
actionadmin_initindex.php:36
actionshow_user_profileindex.php:175
actionedit_user_profileindex.php:176
actionpersonal_options_updateindex.php:250
actionedit_user_profile_updateindex.php:251
actionshow_user_profileindex.php:278
actionedit_user_profileindex.php:279
filteradmin_body_classindex.php:283
actionadmin_enqueue_scriptsindex.php:347
Maintenance & Trust

Wayfinder Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedOct 28, 2024
PHP min version5.6
Downloads17K

Community Trust

Rating100/100
Number of ratings8
Active installs800
Developer Profile

Wayfinder Developer Profile

themolitor

1 plugin · 800 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wayfinder

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wayfinder-admin-wrap
Data Attributes
data-wayfinder-optiondata-wayfinder-value
FAQ

Frequently Asked Questions about Wayfinder