Wordless Extender Security & Risk Analysis

wordpress.org/plugins/wordless-extender

Wordless Extender is a starting point for everyone: list of commonly used plugins, wp-config.php / .htaccess configuration and security improvements.

10 active installs v1.2.1 PHP + WP 4.0+ Updated Sep 28, 2017
configurationhtaccesssecuritywordlesswp-config
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Wordless Extender Safe to Use in 2026?

Generally Safe

Score 85/100

Wordless Extender has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The Wordless Extender plugin v1.2.1 exhibits a mixed security posture. On one hand, it demonstrates excellent practices by using prepared statements exclusively for SQL queries and having no known CVEs or recorded vulnerabilities. The absence of external HTTP requests and no bundled libraries further contribute to a potentially reduced attack surface in these areas.

However, significant concerns arise from the static analysis. The presence of the `create_function` function, which is deprecated and can lead to code injection vulnerabilities if not handled with extreme care, is a notable risk. Furthermore, only a meager 3% of output is properly escaped, indicating a high susceptibility to Cross-Site Scripting (XSS) attacks. The taint analysis revealing that 9 out of 9 analyzed flows have unsanitized paths, even if not classified as critical or high severity, suggests potential for various injection attacks if these paths are exposed to user input.

The plugin's clean vulnerability history is a positive indicator, suggesting it may have been developed with security in mind, or has not yet been thoroughly targeted. However, the identified code signals and taint analysis findings represent genuine weaknesses that could be exploited. The lack of nonces and capability checks, while not explicitly linked to an attack surface in this report, are standard security practices that are absent here, leaving potential gaps for unauthorized actions if an attack vector were to be found.

Key Concerns

  • Dangerous function (create_function) used
  • Low percentage of properly escaped output
  • Unsanitized paths in taint analysis
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Wordless Extender Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Wordless Extender Release Timeline

v1.2.1Current
v1.2.0
v1.1.3
v1.1.2
v1.1.1
v1.1.0
v1.0.8
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3
Code Analysis
Analyzed Mar 17, 2026

Wordless Extender Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
29
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
12
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter('the_generator', create_function('', 'return "";'));wordless-extender\WordlessExtenderSecurity.php:95

Output Escaping

3% escaped30 total outputs
Data Flows · Security
9 unsanitized

Data Flow Analysis

9 flows9 with unsanitized paths
<constants.html> (constants.html.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Wordless Extender Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_enqueue_scriptsfunctions.php:30
actionadmin_enqueue_scriptsfunctions.php:38
actionadmin_menuwordless-extender\WordlessExtender.php:14
actionadmin_action_update_constantswordless-extender\WordlessExtender.php:73
actionadmin_action_update_securitieswordless-extender\WordlessExtender.php:74
filterthe_generatorwordless-extender\WordlessExtenderSecurity.php:95
filterstyle_loader_srcwordless-extender\WordlessExtenderSecurity.php:113
filterscript_loader_srcwordless-extender\WordlessExtenderSecurity.php:114
Maintenance & Trust

Wordless Extender Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedSep 28, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Wordless Extender Developer Profile

welaika

3 plugins · 130 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Wordless Extender

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wordless-extender/stylesheets/wordless-extender.css/wp-content/plugins/wordless-extender/javascripts/constants.js
Script Paths
/wp-content/plugins/wordless-extender/javascripts/constants.js

HTML / DOM Fingerprints

CSS Classes
wle_constantswle_stylewordless-extender
Data Attributes
data-slug
FAQ

Frequently Asked Questions about Wordless Extender