WP Edit Homepage Security & Risk Analysis

wordpress.org/plugins/wp-edit-homepage

A simple WordPress plugin that adds a homepage edit link to the admin sidebar.

200 active installs v1.1 PHP 7.0+ WP 4.9+ Updated Apr 8, 2024
adminedithomepagepage
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Edit Homepage Safe to Use in 2026?

Generally Safe

Score 92/100

WP Edit Homepage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of wp-edit-homepage v1.1 reveals an exceptionally small attack surface with zero identified entry points, including AJAX handlers, REST API routes, shortcodes, and cron events. This suggests a plugin that doesn't actively expose itself to common web vulnerabilities. Furthermore, the code signals indicate good development practices in the areas that were analyzed: no dangerous functions were found, all SQL queries use prepared statements, and all identified outputs are properly escaped. The absence of file operations and external HTTP requests further reduces the potential for certain types of exploits.

The vulnerability history is also clean, with no known CVEs recorded for this plugin. This, combined with the static analysis findings, points to a plugin that has historically been secure and appears to be developed with security in mind. However, the static analysis did note a complete absence of nonce checks and capability checks. While the current attack surface is zero, if any new functionality were introduced that created entry points, the lack of these fundamental WordPress security mechanisms would become a significant concern.

In conclusion, wp-edit-homepage v1.1 presents a very low security risk based on the provided data. Its minimal attack surface and clean code signals are strong indicators of good security. The lack of any past vulnerabilities further reinforces this. The only notable area for improvement, which doesn't currently translate to a direct risk due to the zero attack surface, is the absence of nonce and capability checks, which are standard security measures for WordPress plugins.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Edit Homepage Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Edit Homepage Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

WP Edit Homepage Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_headincludes\class-wp-edit-homepage-plugin.php:27
filterwpedh_filter_global_wp_admin_submenuincludes\class-wp-edit-homepage-plugin.php:30
actionplugins_loadedwp-edit-homepage.php:53
Maintenance & Trust

WP Edit Homepage Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedApr 8, 2024
PHP min version7.0
Downloads4K

Community Trust

Rating100/100
Number of ratings3
Active installs200
Developer Profile

WP Edit Homepage Developer Profile

Tommy Ferry

1 plugin · 200 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Edit Homepage

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Edit Homepage