WordPass Security & Risk Analysis

wordpress.org/plugins/wordpass

Creates word-based passwords for WordPress.

30 active installs v1.0.1 PHP + WP 4.0.0+ Updated Aug 5, 2021
adminpasswordregistrationuserusers
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WordPass Safe to Use in 2026?

Generally Safe

Score 85/100

WordPass has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wordpass" plugin v1.0.1 exhibits a generally positive security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points indicates a minimal attack surface. Furthermore, the lack of dangerous functions, file operations, or external HTTP requests is encouraging. However, a significant concern arises from the presence of a single SQL query that does not utilize prepared statements. This, combined with a low percentage of properly escaped output (57%), creates potential avenues for SQL injection and cross-site scripting (XSS) vulnerabilities.

The plugin's vulnerability history is clean, with no recorded CVEs. This, coupled with the absence of taint analysis issues, suggests that the plugin has either not been heavily targeted, or previous versions have been well-maintained. The presence of a capability check is a positive sign for access control, but the lack of nonce checks is a weakness, particularly if the plugin were to introduce any AJAX or administrative actions in the future.

In conclusion, while the plugin's limited attack surface and clean vulnerability history are strengths, the unescaped SQL query and insufficient output escaping represent tangible risks that should be addressed. The absence of nonce checks, while not an immediate critical flaw given the current entry points, is a potential vulnerability if the plugin's functionality expands.

Key Concerns

  • SQL query without prepared statements
  • Insufficient output escaping
  • Missing nonce checks
Vulnerabilities
None known

WordPass Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WordPass Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
3
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

57% escaped7 total outputs
Attack Surface

WordPass Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterrandom_passwordincludes\class-wordpass.php:32
actioninitwordpass.php:42
actionadmin_initwordpass.php:61
actionadmin_menuwordpass.php:62
filterplugin_action_linkswordpass.php:63
Maintenance & Trust

WordPass Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedAug 5, 2021
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

WordPass Developer Profile

Chad Butler

2 plugins · 50K total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
476 days
View full developer profile
Detection Fingerprints

How We Detect WordPass

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wordpass/admin/css/style.css/wp-content/plugins/wordpass/admin/js/script.js
Script Paths
/wp-content/plugins/wordpass/admin/js/script.js
Version Parameters
wordpass/admin/css/style.css?ver=wordpass/admin/js/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
wordpass-admin-wrap
HTML Comments
<!-- WordPass Options --><!-- End WordPass Options -->
Data Attributes
data-wordpass-nonce
JS Globals
WordPassAdmin
FAQ

Frequently Asked Questions about WordPass