
Wiki on Medal Security & Risk Analysis
wordpress.org/plugins/wiki-on-medalWiki on Medal is a widget that lets your visitors to see article on medal (featured article) from Wikipedia.
Is Wiki on Medal Safe to Use in 2026?
Generally Safe
Score 85/100Wiki on Medal has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wiki-on-medal" v1.2.0 plugin presents a mixed security posture. While the static analysis indicates a very small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and no known vulnerabilities in its history, there are significant concerns within the code itself. The use of the `create_function` is a dangerous practice that can lead to code injection vulnerabilities if user-supplied data is passed into it without strict sanitization. Furthermore, a complete lack of output escaping for all identified outputs is a critical security flaw, opening the door to Cross-Site Scripting (XSS) attacks.
Despite the absence of recorded CVEs and a clean vulnerability history, which is a positive indicator, the internal code signals are concerning. The presence of `create_function` and the total absence of output escaping, combined with no nonce or capability checks on any potential entry points (though the entry points are zero, the presence of these checks on any *future* or *unidentified* entry points would be a safeguard), suggest a lack of fundamental security awareness in development. The plugin's strengths lie in its minimal apparent attack surface and reliance on prepared statements for SQL. However, the identified code quality issues, particularly the unescaped output, represent a tangible and immediate risk.
In conclusion, while "wiki-on-medal" v1.2.0 has a clean external security record and a small attack surface, the internal code analysis reveals critical weaknesses. The use of `create_function` and, more importantly, the complete lack of output escaping are significant vulnerabilities that need immediate attention. Developers should prioritize fixing these issues to mitigate the risk of XSS and potential code injection, even in the absence of known external exploits.
Key Concerns
- No output escaping
- Use of create_function
- No nonce checks
- No capability checks
Wiki on Medal Security Vulnerabilities
Wiki on Medal Release Timeline
Wiki on Medal Code Analysis
Dangerous Functions Found
Output Escaping
Wiki on Medal Attack Surface
WordPress Hooks 2
Maintenance & Trust
Wiki on Medal Maintenance & Trust
Maintenance Signals
Community Trust
Wiki on Medal Alternatives
Wikipedia Anniversaries
wikipedia-anniversaries
Wikipedia Anniversaries is a widget that lets your visitors to see important history dates from Wikipedia.
Wikipedia Widget
wikipedia-widget
Shows a simple Ajax based Wikipedia search-formular and the results for the current post/page title or default keywords.
Classic Widgets
classic-widgets
Enables the previous "classic" widgets settings screens in Appearance - Widgets and the Customizer. Disables the block editor from managing widgets.
ElementsKit Elementor Addons – Advanced Widgets & Templates Addons for Elementor
elementskit-lite
Join millions who empower their websites with ElementsKit Elementor Addons. Get templates, & 100+ widgets like header-footer, mega menu, custom widget
Essential Addons for Elementor – Popular Elementor Templates & Widgets
essential-addons-for-elementor-lite
Elementor addon offering 110+ widgets and templates — Elementor Gallery, Slider, Form, Post Grid, Menu, Accordion, WooCommerce & more.
Wiki on Medal Developer Profile
8 plugins · 100 total installs
How We Detect Wiki on Medal
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wiki-on-medal/style.csswiki-on-medal/style.css?ver=HTML / DOM Fingerprints
<!-- Wiki on Medal widget -->