WP Excerpt Settings Security & Risk Analysis

wordpress.org/plugins/wp-excerpt-settings

Configure WordPress Excerpt through UI (User Interface).

200 active installs v1.1.2 PHP + WP 3.0+ Updated Dec 20, 2017
adminautomaticcorethemeupdates
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Excerpt Settings Safe to Use in 2026?

Generally Safe

Score 85/100

WP Excerpt Settings has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wp-excerpt-settings" plugin version 1.1.2 exhibits a strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero attack surface, which is a significant positive. Furthermore, the code signals indicate a complete absence of dangerous functions and file operations. All SQL queries are properly prepared, and there are no external HTTP requests. This lack of common vulnerability vectors is commendable.

However, a notable concern arises from the output escaping analysis. With 9 total outputs and only 56% properly escaped, there's a significant risk of cross-site scripting (XSS) vulnerabilities. If user-supplied data is being outputted without sufficient sanitization, an attacker could potentially inject malicious scripts. The absence of nonce checks and capability checks, while not immediately alarming given the zero attack surface, could become a concern if the plugin's functionality were to expand or if new entry points were introduced in future versions without proper authorization.

The vulnerability history is also a positive indicator, with zero known CVEs and no recorded vulnerabilities. This suggests a history of secure development or a lack of discovered flaws. In conclusion, while the plugin benefits from a minimal attack surface and a clean vulnerability history, the significant portion of unescaped output represents a clear and present risk that needs to be addressed.

Key Concerns

  • Significant portion of output not properly escaped
Vulnerabilities
None known

WP Excerpt Settings Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Excerpt Settings Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

56% escaped9 total outputs
Attack Surface

WP Excerpt Settings Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterexcerpt_morewp-excerpt-settings.php:33
filterexcerpt_lengthwp-excerpt-settings.php:34
actionadmin_initwp-excerpt-settings.php:36
filterplugin_action_linkswp-excerpt-settings.php:84
actionload-options-reading.phpwp-excerpt-settings.php:92
Maintenance & Trust

WP Excerpt Settings Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 20, 2017
PHP min version
Downloads8K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

WP Excerpt Settings Developer Profile

Yslo

6 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Excerpt Settings

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-excerpt-settings/languages

HTML / DOM Fingerprints

Data Attributes
name="wp_excerpt_options[excerpt_more]"name="wp_excerpt_options[excerpt_length]"
FAQ

Frequently Asked Questions about WP Excerpt Settings