WP Custom Comments Security & Risk Analysis

wordpress.org/plugins/wp-custom-comments

Replacing the standard WordPress commenting form with custom HTML/JavaScript code.

10 active installs v1.0.1 PHP + WP 4.1+ Updated Nov 24, 2024
commentscomments-formcustom-comments-formdisqusreplace-comments-form
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Custom Comments Safe to Use in 2026?

Generally Safe

Score 92/100

WP Custom Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The wp-custom-comments v1.0.1 plugin exhibits a generally positive security posture based on the static analysis, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface. Furthermore, the absence of dangerous functions, external HTTP requests, and a lack of known CVEs in its history are strong indicators of good security practices. However, there are significant concerns. The fact that 100% of SQL queries use prepared statements is excellent, but the complete lack of output escaping is a critical weakness. Additionally, the taint analysis revealed one flow with an unsanitized path, which, while not categorized as critical or high severity, still represents a potential risk for certain types of attacks.

The vulnerability history being completely clear suggests the developers have historically maintained a secure codebase, or the plugin is relatively new and hasn't been subject to significant scrutiny or discovery of vulnerabilities. The absence of any recorded vulnerabilities, including historical ones, is a strength. However, the identified issues in the static analysis, particularly the unescaped output and the unsanitized path flow, warrant attention. The lack of nonce checks and capability checks on the limited entry points (though there are zero unprotected) also leaves room for improvement in securing the plugin's operations.

Key Concerns

  • Output is not properly escaped
  • Flow with unsanitized path found
  • No nonce checks
  • Only one capability check present
Vulnerabilities
None known

WP Custom Comments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Custom Comments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
SettingsPage (wp-custom-comments.php:34)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Custom Comments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedwp-custom-comments.php:22
actionadmin_menuwp-custom-comments.php:26
filtercomments_templatewp-custom-comments.php:30
Maintenance & Trust

WP Custom Comments Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedNov 24, 2024
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Custom Comments Developer Profile

Kei

2 plugins · 310 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Custom Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-custom-comments/comments-template.php

HTML / DOM Fingerprints

CSS Classes
wrap
FAQ

Frequently Asked Questions about WP Custom Comments