Widget Saver Security & Risk Analysis

wordpress.org/plugins/widget-saver

Saves the current widget layout and allows the layout to be restored at a later date.

100 active installs v2.0.0 PHP + WP 2.8+ Updated Sep 22, 2012
adminadministrationthemewidgets
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Widget Saver Safe to Use in 2026?

Generally Safe

Score 85/100

Widget Saver has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The widget-saver v2.0.0 plugin exhibits a mixed security posture. On the positive side, it demonstrates excellent practices regarding database interaction, with all SQL queries utilizing prepared statements. Furthermore, there are no recorded vulnerabilities in its history, suggesting a potentially stable and well-maintained codebase. The plugin also boasts a minimal attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, which generally reduces the opportunities for external exploitation.

However, significant concerns arise from the static code analysis. The presence of the `create_function` call is a critical security risk, as it is highly susceptible to code injection vulnerabilities. Additionally, the analysis indicates that 100% of the outputs are not properly escaped. This lack of output escaping opens the door to Cross-Site Scripting (XSS) attacks, allowing attackers to inject malicious scripts into the WordPress frontend, impacting users who view affected pages.

Despite the absence of a known vulnerability history, the identified code signals strongly suggest that the plugin is vulnerable to critical security flaws. The combination of an insecure legacy function and widespread output escaping issues creates a high-risk profile. While the plugin's small attack surface and good SQL practices are commendable, the discovered code vulnerabilities are severe enough to warrant immediate attention and mitigation.

Key Concerns

  • Uses dangerous create_function()
  • No output escaping
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Widget Saver Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Widget Saver Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functioncreate_function('', 'echo "<tr><td /><td /><td><strong>'.__('Warning').':</strong> '. __('There is awidget-saver.php:27

Output Escaping

0% escaped1 total outputs
Attack Surface

Widget Saver Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_initinclude\widgetsaver_plugin.php:72
actionwidgets_admin_pageinclude\widgetsaver_plugin.php:73
actionadmin_enqueue_scriptsinclude\widgetsaver_plugin.php:74
Maintenance & Trust

Widget Saver Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedSep 22, 2012
PHP min version
Downloads10K

Community Trust

Rating84/100
Number of ratings5
Active installs100
Developer Profile

Widget Saver Developer Profile

zorgbargle

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Widget Saver

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/widget-saver/css/widget-saver-styles.css

HTML / DOM Fingerprints

CSS Classes
widget-saver-controls
FAQ

Frequently Asked Questions about Widget Saver