WeatherWidget Security & Risk Analysis

wordpress.org/plugins/weatherwidget

Shows the current weather of your location or the weather of the visitors location via widget in the sidebar of your wordpress blog.

30 active installs v0.4 PHP + WP 2.5+ Updated Mar 11, 2010
forecastlocal-weatherweatherweather-forecast
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WeatherWidget Safe to Use in 2026?

Generally Safe

Score 85/100

WeatherWidget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "weatherwidget" plugin v0.4 exhibits a mixed security posture. On the positive side, it shows no recorded vulnerabilities (CVEs) and demonstrates good practices regarding SQL queries, exclusively using prepared statements. It also has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed. However, significant concerns arise from the static analysis. The presence of the `create_function` function is a notable risk, as it can be used to execute arbitrary PHP code. Furthermore, a high percentage of output is not properly escaped (89%), indicating a strong potential for Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals two flows with unsanitized paths, which, while not classified as critical or high severity, still represent potential avenues for malicious data injection if these paths are reachable and exploitable.

Key Concerns

  • Dangerous function create_function used
  • High percentage of unescaped output (89%)
  • Taint flows with unsanitized paths (2)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

WeatherWidget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WeatherWidget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
17
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'plugins_loaded', create_function( '$WeatherWidget_5ls2l', 'global $WeatherWidget; $Weatweatherwidget.php:378

Output Escaping

11% escaped19 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
frame (weatherwidget.php:293)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WeatherWidget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterwp_headweatherwidget.php:47
actionadmin_menuweatherwidget.php:50
actionwidgets_initweatherwidget.php:53
filteradmin_footerweatherwidget.php:169
actionplugins_loadedweatherwidget.php:378
Maintenance & Trust

WeatherWidget Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedMar 11, 2010
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

WeatherWidget Developer Profile

fliptel

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WeatherWidget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/weatherwidget/js/colorpicker.js
Script Paths
/wp-content/plugins/weatherwidget/js/colorpicker.js

HTML / DOM Fingerprints

CSS Classes
picker1picker2ColorPickerDivSample
HTML Comments
<!-- ColorPicker --><!-- weatherwidget -->
Data Attributes
class="picker1"class="picker2"class="ColorPickerDivSample"id="ColorPickerDiv"name="weatherwidget[title]"name="weatherwidget[city]"+2 more
JS Globals
jQuery.colorPicker.hideColorPickerjQuery(this).getValuejQuery(this).setSpanColor
FAQ

Frequently Asked Questions about WeatherWidget