WP-FAQ Security & Risk Analysis

wordpress.org/plugins/wp-faq-by-wpdonehere

Provides a professional looking FAQ or Frequently Asked Question area for your website. You can have it up and running in less than 1 minute!

40 active installs v1.01 PHP + WP 3.3+ Updated Unknown
faqqaquestions
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-FAQ Safe to Use in 2026?

Generally Safe

Score 100/100

WP-FAQ has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-faq-by-wpdonehere" plugin v1.01 exhibits a mixed security posture. On the positive side, it demonstrates good practices regarding SQL queries by exclusively using prepared statements and has no recorded vulnerabilities or CVEs. The absence of file operations and external HTTP requests also reduces potential attack vectors. However, there are significant concerns regarding output sanitization and the presence of an unprotected AJAX handler. The static analysis reveals that 100% of its output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly rendered. Furthermore, one of its two AJAX handlers lacks authentication checks, presenting an open door for unauthenticated attackers to potentially trigger unintended actions or access sensitive information.

Key Concerns

  • AJAX handler without auth checks
  • Output escaping not properly implemented
Vulnerabilities
None known

WP-FAQ Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-FAQ Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

TinyMCE

Output Escaping

0% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
update_default_skin (classes\class-faq.php:221)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP-FAQ Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 2

authwp_ajax_get-meta-faq_skin_pickerclasses\class-faq.php:279
authwp_ajax_update_default_skinclasses\class-faq.php:280

Shortcodes 1

[wpfaq] classes\class-shortcode.php:78
WordPress Hooks 13
actioninitclasses\class-faq.php:267
actioninitclasses\class-faq.php:268
actionwp_print_stylesclasses\class-faq.php:270
actionwp_enqueue_scriptsclasses\class-faq.php:271
actionadmin_headclasses\class-faq.php:274
actionadmin_headclasses\class-faq.php:275
filterextend_screen_metaclasses\class-faq.php:278
actionadmin_initclasses\class-faq.php:283
actionadmin_footerclasses\class-screen_meta.php:50
actionadmin_headclasses\class-screen_meta.php:51
filtermce_external_pluginsclasses\class-tinymce.php:12
filtermce_buttonsclasses\class-tinymce.php:13
actioninitclasses\class-tinymce.php:31
Maintenance & Trust

WP-FAQ Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedUnknown
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

WP-FAQ Developer Profile

andrew-anderson

2 plugins · 40 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-FAQ

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP-FAQ