Word Filter Plus Security & Risk Analysis

wordpress.org/plugins/word-filter-plus

Update or clean the contents of your site, by filtering or replacing words and phrases in your posts, pages, excerpts, titles and comments.

20 active installs v2.0 PHP + WP 2.9+ Updated Mar 21, 2014
filterlanguagepostreplacerisky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Word Filter Plus Safe to Use in 2026?

Generally Safe

Score 85/100

Word Filter Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The word-filter-plus v2.0 plugin demonstrates a generally strong security posture based on the provided static analysis. The plugin has a remarkably small attack surface with zero identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) that are unprotected by authentication checks. This is a significant strength as it minimizes the potential for unauthorized access or manipulation. Furthermore, the absence of known CVEs and a clean vulnerability history indicates a history of secure development or diligent patching by the developers.

However, there are areas for improvement. The code analysis reveals that only 57% of output escaping is properly implemented. This means that a notable portion of outputs could potentially be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not handled carefully before being displayed. While the taint analysis did not reveal any unsanitized paths, the incomplete output escaping represents a potential risk that should be addressed. Additionally, the plugin has 27 SQL queries, and while 85% use prepared statements, the remaining 15% are a potential vector for SQL injection if they handle user input without proper sanitization or prepared statements.

In conclusion, word-filter-plus v2.0 is strong in its minimal attack surface and lack of historical vulnerabilities. The primary weaknesses lie in the inconsistent output escaping and the presence of SQL queries that do not utilize prepared statements. Addressing these specific code-level concerns would further enhance the plugin's security and bring it closer to a best-in-class security profile.

Key Concerns

  • Unescaped output detected
  • Raw SQL queries without prepared statements
Vulnerabilities
None known

Word Filter Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Word Filter Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
23 prepared
Unescaped Output
31
41 escaped
Nonce Checks
3
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

85% prepared27 total queries

Output Escaping

57% escaped72 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
save_replacement_data (wfp-settings.php:177)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Word Filter Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionadmin_menuwfp-settings.php:57
actionadmin_initwfp-settings.php:58
actionadmin_initwfp-settings.php:59
actionadmin_headwfp-settings.php:60
actioncontextual_helpwfp-settings.php:61
filtercron_schedulesword-filter-plus.php:113
filtercomment_textword-filter-plus.php:119
filterthe_contentword-filter-plus.php:120
filterthe_titleword-filter-plus.php:121
filterwp_titleword-filter-plus.php:122
filtercontent_save_preword-filter-plus.php:125
filterexcerpt_save_preword-filter-plus.php:126
filtercomment_save_preword-filter-plus.php:127
filtertitle_save_preword-filter-plus.php:128
Maintenance & Trust

Word Filter Plus Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 21, 2014
PHP min version
Downloads8K

Community Trust

Rating20/100
Number of ratings2
Active installs20
Developer Profile

Word Filter Plus Developer Profile

Brian Layman

5 plugins · 3K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Word Filter Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/word-filter-plus/js/wfp-settings.js/wp-content/plugins/word-filter-plus/css/wfp-settings.css
Script Paths
/wp-content/plugins/word-filter-plus/js/wfp-settings.js
Version Parameters
word-filter-plus/js/wfp-settings.js?ver=word-filter-plus/css/wfp-settings.css?ver=

HTML / DOM Fingerprints

CSS Classes
wfp-settings
HTML Comments
<!-- Default settings, delete if you want to reset -->
Data Attributes
data-wfp-settings
JS Globals
WFP_settings
FAQ

Frequently Asked Questions about Word Filter Plus