WP Custom Category Meta Security & Risk Analysis

wordpress.org/plugins/wp-custom-category-meta

Allow you to add custom meta tags and title for category.

100 active installs v1.1.0 PHP + WP 3.5.1+ Updated Apr 18, 2014
categorycategory-titledescriptionkeywordstitle
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Custom Category Meta Safe to Use in 2026?

Generally Safe

Score 85/100

WP Custom Category Meta has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "wp-custom-category-meta" v1.1.0 plugin exhibits a generally strong security posture based on the static analysis. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the attack surface. Furthermore, the plugin's use of prepared statements for its single SQL query and the lack of file operations or external HTTP requests are positive security indicators. However, there are notable areas of concern. A 50% rate of unescaped output suggests that half of the plugin's output might be vulnerable to cross-site scripting (XSS) attacks. The taint analysis also identified three flows with unsanitized paths, although they were not classified as critical or high severity. The complete lack of nonce checks and capability checks on any potential entry points is a significant weakness, as it means actions performed by the plugin may not be properly authenticated or authorized, leaving them open to unauthorized execution if an entry point were discovered or created in a future version. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign of past development practices. However, this clean history, combined with the current lack of authentication checks, could lead to a false sense of security. The strength lies in its limited attack surface and secure database interactions, but the weaknesses in output sanitization and authentication mechanisms, particularly the complete absence of nonce and capability checks, present potential risks that should be addressed.

Key Concerns

  • Unescaped output detected (50%)
  • Taint analysis found unsanitized paths (3 flows)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Custom Category Meta Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Custom Category Meta Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
3
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

50% escaped6 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
wp_ccm_category_form (class-ccm.php:302)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Custom Category Meta Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actioninitclass-ccm.php:50
actionwpmu_new_blogclass-ccm.php:53
actionedit_category_formclass-ccm.php:58
actionedited_categoryclass-ccm.php:59
filterwp_titleclass-ccm.php:61
actionwp_headclass-ccm.php:62
actionplugins_loadedwp-custom-category-meta.php:42
Maintenance & Trust

WP Custom Category Meta Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 18, 2014
PHP min version
Downloads5K

Community Trust

Rating90/100
Number of ratings2
Active installs100
Developer Profile

WP Custom Category Meta Developer Profile

Musilek

2 plugins · 110 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Custom Category Meta

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Custom Category Meta