Widget Display Filter Security & Risk Analysis

wordpress.org/plugins/widget-display-filter

Set the display condition for each widget. Widgets display condition setting can be easily, and very easy-to-use plugin.

40 active installs v2.0.0 PHP 7.3+ WP 5.9+ Updated Feb 24, 2022
conditional-tagsfilterhidewidgetwidget-group-block
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Widget Display Filter Safe to Use in 2026?

Generally Safe

Score 85/100

Widget Display Filter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "widget-display-filter" plugin v2.0.0 exhibits a generally positive security posture based on the provided static analysis. The absence of any known CVEs, critical or high-severity taint flows, and a complete lack of file operations or external HTTP requests are strong indicators of good development practices. Furthermore, the presence of numerous nonce checks and a decent number of capability checks on the identified entry points suggests an awareness of common WordPress security vulnerabilities. The fact that all identified entry points (AJAX handlers) are protected is a significant strength.

However, a key area for concern lies within the handling of SQL queries. The analysis reveals one SQL query that is not using prepared statements, which presents a potential risk of SQL injection. Additionally, a low percentage of output escaping (4%) across 23 identified outputs is a significant weakness. While taint analysis did not reveal any unsanitized paths, the lack of robust output escaping means that user-supplied data, if it ever finds its way into these outputs, could potentially lead to Cross-Site Scripting (XSS) vulnerabilities, especially if combined with future changes or undiscovered vulnerabilities.

Overall, the plugin is well-protected against common injection vectors through its input validation and lack of external dependencies. Its vulnerability history being clean is a positive sign. The primary weaknesses are the non-prepared SQL query and the low rate of output escaping, which, despite the current lack of critical taint flows, represent areas that require attention to solidify its security. Addressing these would move the plugin towards a more robust and secure state.

Key Concerns

  • SQL query without prepared statement
  • Low percentage of properly escaped output
Vulnerabilities
None known

Widget Display Filter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Widget Display Filter Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
22
1 escaped
Nonce Checks
7
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

4% escaped23 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<widget-display-setting> (widget-display-setting.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Widget Display Filter Attack Surface

Entry Points3
Unprotected0

AJAX Handlers 3

authwp_ajax_Widget_filter_postidwidget-display-setting.php:20
authwp_ajax_Widget_filter_categorywidget-display-setting.php:21
authwp_ajax_Widget_filter_post_tagwidget-display-setting.php:22
WordPress Hooks 8
actioninitwidget-display-filter.php:18
actionwidgets_initwidget-display-filter.php:47
filterwidget_display_callbackwidget-display-filter.php:48
actionadmin_initwidget-display-setting.php:16
actionadmin_menuwidget-display-setting.php:17
actionadmin_print_styles-appearance_page_widget_display_filter_manage_pagewidget-display-setting.php:18
actionadmin_print_scripts-appearance_page_widget_display_filter_manage_pagewidget-display-setting.php:19
actionadmin_noticeswidget-display-setting.php:41
Maintenance & Trust

Widget Display Filter Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedFeb 24, 2022
PHP min version7.3
Downloads4K

Community Trust

Rating100/100
Number of ratings2
Active installs40
Developer Profile

Widget Display Filter Developer Profile

enomoto celtislab

12 plugins · 9K total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Widget Display Filter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/widget-display-filter/widget-display-filter.php/wp-content/plugins/widget-display-filter/widget-display-setting.php
Version Parameters
widget-display-filter/widget-display-filter.php?ver=widget-display-filter/widget-display-setting.php?ver=

HTML / DOM Fingerprints

CSS Classes
wdfilter-settings
HTML Comments
<!-- widget display filter -->
Data Attributes
data-wdfilter-id
JS Globals
wdfilter_params
FAQ

Frequently Asked Questions about Widget Display Filter