WP Client Reference Security & Risk Analysis

wordpress.org/plugins/wp-client-reference

Create a reference guide for clients right in the WordPress administration area.

10 active installs v0.42 PHP + WP 3.3+ Updated Oct 5, 2012
clienthelpknowledgebasereference
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Client Reference Safe to Use in 2026?

Generally Safe

Score 85/100

WP Client Reference has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "wp-client-reference" v0.42 plugin exhibits a strong security posture based on the provided static analysis. The absence of known vulnerabilities, critical taint flows, dangerous functions, and external HTTP requests is highly positive. Furthermore, the plugin demonstrates good practices by exclusively using prepared statements for SQL queries and having a seemingly limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are unprotected.

However, a significant concern arises from the output escaping. With 8 total outputs and only 38% properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. This means sensitive user data or plugin functionality could be exploited through improperly sanitized output displayed to users. The lack of nonce and capability checks, while potentially acceptable given the analysis showing no unprotected entry points, still represents a missed opportunity for robust authorization and integrity checks, especially if the attack surface were to expand in future versions.

In conclusion, while the plugin has a clean vulnerability history and avoids many common pitfalls like raw SQL and dangerous functions, the poor output escaping represents a critical weakness. This aspect needs immediate attention to prevent potential XSS exploits. The plugin's strengths lie in its clean history and use of prepared statements, but the unescaped output is a clear and present danger.

Key Concerns

  • Poor output escaping detected
Vulnerabilities
None known

WP Client Reference Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Client Reference Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

38% escaped8 total outputs
Attack Surface

WP Client Reference Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionadmin_menufunctions.php:42
actionadmin_menufunctions.php:43
actionadmin_initfunctions.php:44
actionadmin_menufunctions.php:46
filterget_the_excerptfunctions.php:48
actioninitwp-client-reference.php:41
Maintenance & Trust

WP Client Reference Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedOct 5, 2012
PHP min version
Downloads3K

Community Trust

Rating80/100
Number of ratings4
Active installs10
Developer Profile

WP Client Reference Developer Profile

Steve Grunwell

6 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Client Reference

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-client-reference/views/admin-options.js/wp-content/plugins/wp-client-reference/css/admin-options.css
Script Paths
/wp-content/plugins/wp-client-reference/views/admin-options.js
Version Parameters
wp-client-reference/css/admin-options.css?ver=wp-client-reference/views/admin-options.js?ver=

HTML / DOM Fingerprints

CSS Classes
wpclientref-settings
FAQ

Frequently Asked Questions about WP Client Reference