WP Forecast Weather Security & Risk Analysis

wordpress.org/plugins/wp-forecast-weather

Forecast Weather plugin for wordpress using Wunderground API.

10 active installs v1.0 PHP + WP 4.0+ Updated Sep 25, 2014
forecastweatherwunderground
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Forecast Weather Safe to Use in 2026?

Generally Safe

Score 85/100

WP Forecast Weather has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-forecast-weather v1.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, the consistent use of prepared statements for SQL queries, and the proper escaping of all output are excellent security practices. The plugin also doesn't make external HTTP requests and has no known vulnerabilities, suggesting a well-maintained and secure codebase. The limited attack surface, with only one shortcode and no AJAX handlers or REST API routes without checks, further contributes to its favorable security profile.

However, there are a few areas of concern. The lack of nonce checks on the shortcode, while not immediately leading to a critical vulnerability in this analysis, represents a potential weakness. If the shortcode's functionality involves sensitive operations or user-modifiable data, the absence of nonces could open the door to Cross-Site Request Forgery (CSRF) attacks. Similarly, the missing capability checks for the shortcode mean that any user, regardless of their role or permissions, can potentially trigger its functionality. The single file operation also warrants a closer look, though without further context or taint analysis, its security impact remains unclear. The overall conclusion is that the plugin is on a good trajectory, but these specific entry points lack crucial security protections that should be addressed.

Key Concerns

  • Shortcode lacks nonce check
  • Shortcode lacks capability check
  • File operation present
Vulnerabilities
None known

WP Forecast Weather Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Forecast Weather Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

WP Forecast Weather Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[fw] fw.php:16
WordPress Hooks 1
actionwp_enqueue_scriptsfw.php:15
Maintenance & Trust

WP Forecast Weather Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 25, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Forecast Weather Developer Profile

iphoenix

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Forecast Weather

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-forecast-weather/css/weather-icons.css

HTML / DOM Fingerprints

CSS Classes
weatherunit
Shortcode Output
<div class="weatherunit" style="float: left; width:
FAQ

Frequently Asked Questions about WP Forecast Weather