WP Confirm Security & Risk Analysis

wordpress.org/plugins/wp-confirm

Adds a confirm dialog on saving post, menu and permalinks.

0 active installs v1.0.0 PHP + WP 5.0.1+ Updated Oct 14, 2020
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Confirm Safe to Use in 2026?

Generally Safe

Score 85/100

WP Confirm has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "wp-confirm" v1.0.0 plugin exhibits a seemingly secure posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. The code also shows no instances of dangerous functions, file operations, or external HTTP requests. Furthermore, all SQL queries are noted to use prepared statements, and there are no recorded vulnerabilities (CVEs) or taint flows. This suggests a development effort focused on minimizing potential entry points and adhering to secure coding practices for database interactions.

However, a significant concern arises from the complete lack of output escaping. With 4 identified outputs and 0% properly escaped, this opens the door to potential cross-site scripting (XSS) vulnerabilities. If user-supplied data is ever reflected in the output without proper sanitization, an attacker could inject malicious scripts. The absence of nonce and capability checks also means that even if there were entry points, they would be susceptible to unauthorized access or manipulation, although currently, the attack surface is zero. The lack of vulnerability history is positive, but it doesn't negate the immediate risks identified in the static analysis, particularly the unescaped output.

In conclusion, while the plugin has strong points in terms of attack surface reduction and secure SQL handling, the critical flaw of unescaped output presents a tangible risk. The absence of security checks on potential entry points (even if currently none exist) is a weakness. The plugin needs immediate attention to address the output escaping issue to mitigate XSS risks, and a review of its architecture to ensure future developments incorporate proper authorization checks.

Key Concerns

  • Output not properly escaped
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Confirm Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Confirm Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped4 total outputs
Attack Surface

WP Confirm Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 16
actionadmin_menuadmin\class-wp-confirm-admin.php:115
actionadmin_initadmin\class-wp-confirm-admin.php:116
actionadmin_footeradmin\class-wp-confirm-admin.php:285
actionplugins_loadedincludes\class-wp-confirm.php:142
actionadmin_enqueue_scriptsincludes\class-wp-confirm.php:157
actionadmin_enqueue_scriptsincludes\class-wp-confirm.php:158
actionwp_enqueue_scriptsincludes\class-wp-confirm.php:173
actionwp_enqueue_scriptsincludes\class-wp-confirm.php:174
actionadmin_menutrunk\admin\class-wp-confirm-admin.php:115
actionadmin_inittrunk\admin\class-wp-confirm-admin.php:116
actionadmin_footertrunk\admin\class-wp-confirm-admin.php:285
actionplugins_loadedtrunk\includes\class-wp-confirm.php:142
actionadmin_enqueue_scriptstrunk\includes\class-wp-confirm.php:157
actionadmin_enqueue_scriptstrunk\includes\class-wp-confirm.php:158
actionwp_enqueue_scriptstrunk\includes\class-wp-confirm.php:173
actionwp_enqueue_scriptstrunk\includes\class-wp-confirm.php:174
Maintenance & Trust

WP Confirm Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedOct 14, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

WP Confirm Alternatives

No alternatives data available yet.

Developer Profile

WP Confirm Developer Profile

Abuzer

3 plugins · 240 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Confirm

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-confirm/admin/css/wp-confirm-admin.css/wp-content/plugins/wp-confirm/admin/js/wp-confirm-admin.js
Script Paths
admin/js/wp-confirm-admin.js
Version Parameters
wp-confirm-admin.css?ver=wp-confirm-admin.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Generated by the WordPress Option Page generator --><!-- at http://jeremyhixon.com/wp-tools/option-page/ -->
FAQ

Frequently Asked Questions about WP Confirm