
WP Confirm Security & Risk Analysis
wordpress.org/plugins/wp-confirmAdds a confirm dialog on saving post, menu and permalinks.
Is WP Confirm Safe to Use in 2026?
Generally Safe
Score 85/100WP Confirm has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-confirm" v1.0.0 plugin exhibits a seemingly secure posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. The code also shows no instances of dangerous functions, file operations, or external HTTP requests. Furthermore, all SQL queries are noted to use prepared statements, and there are no recorded vulnerabilities (CVEs) or taint flows. This suggests a development effort focused on minimizing potential entry points and adhering to secure coding practices for database interactions.
However, a significant concern arises from the complete lack of output escaping. With 4 identified outputs and 0% properly escaped, this opens the door to potential cross-site scripting (XSS) vulnerabilities. If user-supplied data is ever reflected in the output without proper sanitization, an attacker could inject malicious scripts. The absence of nonce and capability checks also means that even if there were entry points, they would be susceptible to unauthorized access or manipulation, although currently, the attack surface is zero. The lack of vulnerability history is positive, but it doesn't negate the immediate risks identified in the static analysis, particularly the unescaped output.
In conclusion, while the plugin has strong points in terms of attack surface reduction and secure SQL handling, the critical flaw of unescaped output presents a tangible risk. The absence of security checks on potential entry points (even if currently none exist) is a weakness. The plugin needs immediate attention to address the output escaping issue to mitigate XSS risks, and a review of its architecture to ensure future developments incorporate proper authorization checks.
Key Concerns
- Output not properly escaped
- Missing nonce checks
- Missing capability checks
WP Confirm Security Vulnerabilities
WP Confirm Code Analysis
Output Escaping
WP Confirm Attack Surface
WordPress Hooks 16
Maintenance & Trust
WP Confirm Maintenance & Trust
Maintenance Signals
Community Trust
WP Confirm Alternatives
No alternatives data available yet.
WP Confirm Developer Profile
3 plugins · 240 total installs
How We Detect WP Confirm
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-confirm/admin/css/wp-confirm-admin.css/wp-content/plugins/wp-confirm/admin/js/wp-confirm-admin.jsadmin/js/wp-confirm-admin.jswp-confirm-admin.css?ver=wp-confirm-admin.js?ver=HTML / DOM Fingerprints
<!-- Generated by the WordPress Option Page generator --><!-- at http://jeremyhixon.com/wp-tools/option-page/ -->