Widget Alias Security & Risk Analysis

wordpress.org/plugins/widget-alias

Duplicate any existing widget using the Widget Alias widget and shortcode.

200 active installs v1.7.3 PHP + WP 3.0+ Updated Mar 10, 2026
aliasduplicatereproducesynchronizewidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Widget Alias Safe to Use in 2026?

Generally Safe

Score 100/100

Widget Alias has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 24d ago
Risk Assessment

The "widget-alias" plugin v1.7.3 exhibits a mixed security posture. On the positive side, there are no known vulnerabilities in its history and the static analysis reveals no dangerous functions, file operations, external HTTP requests, or SQL queries that are not properly prepared. The attack surface, while consisting of two shortcodes, is entirely unprotected by authentication or capability checks, which is a significant concern. The most critical finding is that 100% of output escaping is missing, meaning all dynamic content rendered by the plugin is potentially vulnerable to cross-site scripting (XSS) attacks. Taint analysis also yielded no flows, which is good, but this is likely overshadowed by the lack of output escaping, as any unsanitized input could easily lead to a dangerous flow that wasn't detected due to the absence of proper sanitization and escaping.

Despite the absence of historical vulnerabilities and the use of prepared statements for SQL, the complete lack of output escaping on all outputs presents a high risk. The two shortcodes, while not directly exploitable through unauthenticated AJAX or REST API routes, can still be triggered by users with the ability to edit posts or pages. If any user-supplied data is incorporated into the output of these shortcodes without proper sanitization, it can lead to XSS vulnerabilities. The vulnerability history being clean is a positive sign of past security efforts, but it does not mitigate the immediate risks identified in the current code analysis, particularly the lack of output escaping.

Key Concerns

  • All outputs are unescaped
  • Shortcodes lack authentication/capability checks
Vulnerabilities
None known

Widget Alias Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Widget Alias Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

Widget Alias Attack Surface

Entry Points2
Unprotected0

Shortcodes 2

[wa] widget-alias.php:94
[widget_alias] widget-alias.php:95
WordPress Hooks 3
actionadmin_enqueue_scriptswidget-alias.php:51
actionwidgets_initwidget-alias.php:65
filterwidget_display_callbackwidget-alias.php:279
Maintenance & Trust

Widget Alias Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 10, 2026
PHP min version
Downloads13K

Community Trust

Rating86/100
Number of ratings8
Active installs200
Developer Profile

Widget Alias Developer Profile

MIGHTYminnow

4 plugins · 12K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Widget Alias

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/widget-alias/lib/css/widget-alias.css/wp-content/plugins/widget-alias/lib/js/widget-alias.js
Script Paths
/wp-content/plugins/widget-alias/lib/js/widget-alias.js
Version Parameters
widget-alias/style.css?ver=widget-alias.js?ver=

HTML / DOM Fingerprints

CSS Classes
widget-alias
Data Attributes
id="widget-alias-alias-widget-id"name="widget-alias-alias-widget-id"id="widget-alias-title"name="widget-alias-title"
JS Globals
translations
Shortcode Output
[wa [widget_alias
FAQ

Frequently Asked Questions about Widget Alias