WP Calories Security & Risk Analysis

wordpress.org/plugins/wp-calories

WP Calories shows a beautiful food photo whith calories ( kcal ) description on Your sidebar.

10 active installs v1.0 PHP + WP 2.3+ Updated Aug 13, 2010
dietsfotohealth-foodphotoweight-loss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Calories Safe to Use in 2026?

Generally Safe

Score 85/100

WP Calories has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The wp-calories v1.0 plugin exhibits a generally good security posture based on the provided static analysis. The absence of known vulnerabilities and CVEs, coupled with the lack of dangerous functions and file operations, is highly positive. Notably, all SQL queries are secured using prepared statements, which significantly mitigates SQL injection risks. The attack surface is also remarkably small, with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without proper authentication or permission checks.

However, a significant concern arises from the output escaping. With 0% of outputs properly escaped, this plugin is highly susceptible to Cross-Site Scripting (XSS) vulnerabilities. Any data processed or displayed by the plugin that originates from user input or external sources could be injected with malicious scripts, compromising user sessions or the website itself. The complete absence of nonce checks and capability checks also means that any existing entry points, however few, are not adequately protected against unauthorized actions.

Given the clean vulnerability history and the secure handling of SQL, the main weaknesses lie in the output escaping and the lack of nonce/capability checks. While the attack surface is minimal, the unescaped output presents a clear and present danger. Future versions should prioritize robust output sanitization and the implementation of proper authorization checks on all relevant entry points to achieve a more comprehensive security profile.

Key Concerns

  • Output escaping is 0% proper
  • Nonce checks are 0
  • Capability checks are 0
Vulnerabilities
None known

WP Calories Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP Calories Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

WP Calories Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

WP Calories Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedwp-calories.php:204
Maintenance & Trust

WP Calories Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedAug 13, 2010
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Calories Developer Profile

jakubas

6 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Calories

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-calories/images/bg.png

HTML / DOM Fingerprints

CSS Classes
wp_calories_imgwp_calories
Data Attributes
id="wp_calories_image_in"id="img_wp_calories"id="desc_wp_calories"id="url_wp_calories"id="wp_calories_kcal_txt"id="wp_calories_kcal_txt_s"
Shortcode Output
<ul class="wp_calories"><img class="wp_calories_img"id="wp_calories_kcal_txt"><span id="wp_calories_kcal_txt_s">kcal</span>
FAQ

Frequently Asked Questions about WP Calories