Cassava CAS Server Security & Risk Analysis

wordpress.org/plugins/wp-cas-server

Cassava provides authentication services based on the Jasig CAS protocol.

30 active installs v1.2.3 PHP + WP 3.9+ Updated Feb 13, 2016
authenticationcascentral-authentication-servicejasig-cassingle-sign-on
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Cassava CAS Server Safe to Use in 2026?

Generally Safe

Score 85/100

Cassava CAS Server has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The wp-cas-server plugin v1.2.3 exhibits a generally strong security posture from a static analysis perspective. The absence of direct attack surface points like AJAX handlers, REST API routes, shortcodes, and cron events is a significant positive. Furthermore, the code signals indicate a lack of dangerous functions and file operations, and all SQL queries utilize prepared statements, which are excellent security practices. The plugin also shows no external HTTP requests or bundled libraries, reducing potential attack vectors. However, the complete lack of output escaping is a notable concern. While taint analysis and vulnerability history show no current issues, this absence of output sanitization could lead to cross-site scripting (XSS) vulnerabilities if any data is ever outputted without proper escaping, especially if future development introduces dynamic content handling.

The plugin's development history shows no recorded vulnerabilities, which is highly encouraging and suggests a commitment to security by the developers. However, the static analysis did highlight one critical weakness: the complete absence of output escaping. This means that any dynamic data that is rendered by the plugin is susceptible to being displayed unescaped to the user. If this data originates from a source that can be influenced by an attacker, it could lead to cross-site scripting (XSS) vulnerabilities. While no current flows indicate this risk, it's a potential flaw that could be exploited with future code changes or if the plugin's functionality evolves.

In conclusion, wp-cas-server v1.2.3 is strong in preventing direct access and data manipulation through SQL. The lack of known vulnerabilities is a testament to its current security. The primary weakness lies in the universal lack of output escaping, which, while not actively exploited in the current code, represents a significant potential risk that should be addressed to ensure long-term security and prevent future XSS vulnerabilities.

Key Concerns

  • Output escaping not implemented
Vulnerabilities
None known

Cassava CAS Server Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cassava CAS Server Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Cassava CAS Server Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_noticeswp-requirements.php:260
actionadmin_initwp-requirements.php:261
Maintenance & Trust

Cassava CAS Server Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedFeb 13, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs30
Developer Profile

Cassava CAS Server Developer Profile

Luis Rodrigues

3 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cassava CAS Server

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Cassava CAS Server