easy AMP Security & Risk Analysis

wordpress.org/plugins/wp-amp-it-up

Enable AMP (Accelerated Mobile Pages) on your site. Just install, activate and it´s done! The official AMP Plugin for WordPress by amp-cloud.

700 active installs v4.3 PHP 5.0+ WP 2.0+ Updated May 25, 2024
accelerated-mobile-pagesampamp-for-wpamp-projectgoogle-amp
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is easy AMP Safe to Use in 2026?

Generally Safe

Score 92/100

easy AMP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The wp-amp-it-up plugin v4.3 presents a mixed security posture. On the positive side, the plugin has no recorded vulnerabilities (CVEs), indicating a history of stable security. Furthermore, it utilizes prepared statements for all its SQL queries, a crucial practice for preventing SQL injection. The absence of bundled libraries also removes a common attack vector associated with outdated third-party code.

However, significant concerns arise from the static analysis. A complete lack of capability checks and nonce checks on its entry points (even though the reported attack surface is zero) is a major red flag. This suggests that if any entry points are introduced or discovered later, they might be entirely unprotected. The analysis also reveals that 100% of the plugin's output is not properly escaped. This means user-supplied data or dynamic content rendered by the plugin could be vulnerable to Cross-Site Scripting (XSS) attacks. While taint analysis did not find critical or high severity unsanitized paths, the two identified flows with unsanitized paths, coupled with the unescaped output, warrant attention.

In conclusion, while the plugin benefits from a clean vulnerability history and secure database interaction, the absence of fundamental security checks like capability and nonce verification on its (currently zero) entry points, and the widespread lack of output escaping, represent critical weaknesses. The plugin's security could be significantly improved by implementing robust access controls and ensuring all output is properly sanitized.

Key Concerns

  • Missing capability checks on entry points
  • Missing nonce checks on entry points
  • Unescaped output across all outputs
  • Flows with unsanitized paths (2)
Vulnerabilities
None known

easy AMP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

easy AMP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
10
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
amp_cloud_insert_verifitag (wp-amp-it-up.php:627)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

easy AMP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedwp-amp-it-up.php:817
actionwp_headwp-amp-it-up.php:818
actionwp_headwp-amp-it-up.php:819
actionwp_loadedwp-amp-it-up.php:820
Maintenance & Trust

easy AMP Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 25, 2024
PHP min version5.0
Downloads48K

Community Trust

Rating72/100
Number of ratings9
Active installs700
Developer Profile

easy AMP Developer Profile

amp-cloud.de

1 plugin · 700 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect easy AMP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about easy AMP