Weekly Archive Widget Security & Risk Analysis

wordpress.org/plugins/weekly-archive-widget

Requires at least 2.8 Tested up to: 4.3 Stable tag: trunk

20 active installs v1.0 PHP + WP + Updated Aug 31, 2015
archivearchivesweekweeklyweekly-archive
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Weekly Archive Widget Safe to Use in 2026?

Generally Safe

Score 85/100

Weekly Archive Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "weekly-archive-widget" plugin version 1.0 presents a mixed security profile. On the positive side, the plugin has a remarkably small attack surface with no detectable AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, indicating good practices in these common risk areas. The lack of recorded vulnerabilities and CVEs suggests a history of stable and likely secure development.

However, several significant concerns warrant attention. The presence of the `create_function` function is a serious security risk, as it is deprecated and can lead to arbitrary code execution if misused or if data passed to it is not rigorously sanitized. Additionally, only 25% of output is properly escaped, leaving a substantial portion vulnerable to Cross-Site Scripting (XSS) attacks. The complete absence of nonce checks and capability checks across all entry points, while currently not a problem due to the lack of entry points, represents a critical weakness that would become a major vulnerability if any new entry points were introduced without proper security.

In conclusion, while the plugin's current minimal attack surface and absence of past vulnerabilities are strengths, the identified use of `create_function` and insufficient output escaping represent clear and present dangers. The lack of any authentication or authorization checks, though not exploitable with the current structure, is a fundamental security deficit. Addressing the `create_function` and improving output escaping are immediate priorities.

Key Concerns

  • Use of deprecated and dangerous create_function
  • Only 25% of output properly escaped (XSS risk)
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Weekly Archive Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Weekly Archive Widget Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("Weekly_Archive_Widget");'));weekly-archive-widget.php:52

Output Escaping

25% escaped8 total outputs
Attack Surface

Weekly Archive Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initweekly-archive-widget.php:52
Maintenance & Trust

Weekly Archive Widget Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedAug 31, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Weekly Archive Widget Developer Profile

ericjuden

7 plugins · 210 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Weekly Archive Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
weekly-archive-widget
Data Attributes
name="weekly-archive-dropdown"onChange='document.location.href=this.options[this.selectedIndex].value;'
FAQ

Frequently Asked Questions about Weekly Archive Widget