WoWpi Security & Risk Analysis

wordpress.org/plugins/wowpi

The WoWpi plugin allows you to retrieve data from Battle.net API regarding your World of Warcraft character and/or guild.

20 active installs v2.5.2 PHP + WP 3.0.1+ Updated Unknown
armoryworld-of-warcraftwow
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WoWpi Safe to Use in 2026?

Generally Safe

Score 100/100

WoWpi has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wowpi" plugin v2.5.2 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and critical taint flows is a significant positive indicator. The plugin demonstrates good practices in SQL query handling, with 100% of queries utilizing prepared statements, and a healthy number of output operations are properly escaped. However, several areas raise concerns that temper this positive outlook. The lack of nonce checks and capability checks across all entry points is a significant weakness, potentially exposing the plugin to various attack vectors if any of its entry points were to be manipulated. Additionally, the moderate output escaping rate suggests a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully in the 47% of outputs that are not properly escaped. The file operations and external HTTP requests, while not explicitly flagged as problematic in the static analysis, warrant careful review in the context of the overall security.

While the plugin has no recorded vulnerability history, this does not guarantee future security. The absence of known vulnerabilities could be due to a lack of thorough historical analysis of the plugin itself, or simply that no exploitable vulnerabilities have been discovered and reported. The total entry points are manageable, and all appear to be protected by some form of authentication or authorization, which is a positive sign. However, the absence of specific nonce and capability checks on these entry points is a critical oversight that significantly increases the risk profile. The plugin's strengths lie in its secure SQL handling and the absence of critical taint flows and CVEs. Its weaknesses are primarily in the lack of granular access control mechanisms like nonce and capability checks, and the moderate output escaping rate.

Key Concerns

  • No nonce checks found
  • No capability checks found
  • Moderate output escaping (53%)
Vulnerabilities
None known

WoWpi Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WoWpi Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
54
61 escaped
Nonce Checks
0
Capability Checks
0
File Operations
22
External Requests
2
Bundled Libraries
0

Output Escaping

53% escaped115 total outputs
Attack Surface

WoWpi Attack Surface

Entry Points6
Unprotected0

Shortcodes 6

[wowpi_character] includes\wowpi_shortcodes.php:5
[wowpi_guild_members] includes\wowpi_shortcodes.php:6
[wowpi_guild_progression] includes\wowpi_shortcodes.php:7
[wowpi_guild_achievements] includes\wowpi_shortcodes.php:8
[wowpi_tabard] includes\wowpi_shortcodes.php:9
[wowpi_realms] includes\wowpi_shortcodes.php:10
WordPress Hooks 6
actionwp_enqueue_scriptsincludes\scripts.php:37
actionadmin_menuincludes\wowpi_admin.php:15
actionadmin_initincludes\wowpi_admin.php:40
actioninitincludes\wowpi_shortcodes.php:13
actionwidgets_initincludes\wowpi_widgets.php:7
actionplugins_loadedwowpi.php:29
Maintenance & Trust

WoWpi Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedUnknown
PHP min version
Downloads9K

Community Trust

Rating100/100
Number of ratings12
Active installs20
Developer Profile

WoWpi Developer Profile

avenirer

2 plugins · 30 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WoWpi

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wowpi/assets/css/wowpi_faction.css/wp-content/plugins/wowpi/assets/css/wowpi_light.css/wp-content/plugins/wowpi/assets/css/wowpi_dark.css/wp-content/plugins/wowpi/assets/js/wowpi.js
Script Paths
//wow.zamimg.com/widgets/power.js//static-azeroth.cursecdn.com/current/js/syndication/tt.js//cdn.datatables.net/1.10.12/js/jquery.dataTables.min.js
Version Parameters
wowpi/assets/js/wowpi.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WoWpi