WODHOPPER Security & Risk Analysis

wordpress.org/plugins/wodhopper

Easily embed, manage and configure WODHOPPER into WordPress.

10 active installs v1.0.6 PHP + WP 3.0+ Updated Jan 9, 2013
affiliatecrossfitembedscoreboardwod
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WODHOPPER Safe to Use in 2026?

Generally Safe

Score 85/100

WODHOPPER has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "wodhopper" plugin version 1.0.6 presents a mixed security posture. On the positive side, static analysis reveals no dangerous functions, file operations, or external HTTP requests, and all SQL queries utilize prepared statements. The plugin also demonstrates some good practices by including capability checks and bundling the TinyMCE library, which is standard. The absence of known vulnerabilities (CVEs) in its history is a strong indicator of past security diligence.

However, a significant concern arises from the complete lack of output escaping across all identified output points. This means that any dynamic content generated by the plugin, if it originates from user-supplied input or external sources, is not being properly sanitized before being displayed. This creates a high risk for Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website that could then be executed by other users. The lack of nonce checks, while not directly tied to a specific entry point in this analysis, is generally a good practice for preventing Cross-Site Request Forgery (CSRF) attacks on AJAX actions.

In conclusion, while the plugin shows strength in its handling of SQL and absence of known vulnerabilities, the critical flaw of unescaped output represents a substantial risk that needs immediate attention. The plugin's attack surface is minimal, but the vulnerability within that surface is significant.

Key Concerns

  • All identified outputs are unescaped
  • No nonce checks on any entry points
Vulnerabilities
None known

WODHOPPER Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WODHOPPER Release Timeline

v1.0.6Current
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Mar 17, 2026

WODHOPPER Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

Output Escaping

0% escaped10 total outputs
Attack Surface

WODHOPPER Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wodhopper_scoreboard_button] wodhopper.php:59
WordPress Hooks 7
actionadmin_menuutil\wodhopper_options.php:16
actionadmin_initutil\wodhopper_options.php:17
filtermce_external_pluginsutil\wodhopper_tinymce.php:23
filtermce_buttonsutil\wodhopper_tinymce.php:24
actionwp_headwodhopper.php:43
filterwp_insert_post_datawodhopper.php:52
actioninitwodhopper.php:65
Maintenance & Trust

WODHOPPER Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJan 9, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WODHOPPER Developer Profile

wodhopper

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WODHOPPER

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wodhopper/assets/css/wodhopper_scoreboard_styles.css
Script Paths
http://app.wodhopper.com/js/wodhopper.js

HTML / DOM Fingerprints

Shortcode Output
[wodhopper_scoreboard_button placement="" wod_date=""]
FAQ

Frequently Asked Questions about WODHOPPER