WP Headmaster Security & Risk Analysis

wordpress.org/plugins/wp-headmaster

A simple plugin for adding, enqueuing and organising common items into the Head tag without hard-coding.

200 active installs v0.3 PHP + WP 3.0.1+ Updated Feb 21, 2014
google-fontsjquerymeta-authorresponsiveseo
64
C · Use Caution
CVEs total1
Unpatched1
Last CVEJan 14, 2025
Safety Verdict

Is WP Headmaster Safe to Use in 2026?

Use With Caution

Score 64/100

WP Headmaster has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Jan 14, 2025Updated 12yr ago
Risk Assessment

The plugin "wp-headmaster" v0.3 exhibits a mixed security posture. On the positive side, it has a very small attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events identified. The code also demonstrates good practices in its use of prepared statements for all SQL queries and includes nonce and capability checks, indicating an awareness of common WordPress security vulnerabilities. However, a significant concern arises from the static analysis revealing that only 15% of its 26 output operations are properly escaped. This, coupled with taint analysis showing two flows with unsanitized paths, suggests a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. The vulnerability history further reinforces this concern, with one medium severity CVE recorded, specifically an XSS vulnerability, and crucially, this vulnerability remains unpatched as of January 14, 2025. The pattern of XSS vulnerabilities and the presence of unpatched issues, despite efforts in other security areas, indicates that input sanitization and output escaping are weak points that require immediate attention.

Key Concerns

  • Unpatched medium severity CVE (XSS)
  • Low percentage of properly escaped outputs
  • Taint flows with unsanitized paths
Vulnerabilities
1

WP Headmaster Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-22755medium · 6.1Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

WP Headmaster <= 0.3 - Reflected Cross-Site Scripting

Jan 14, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP Headmaster Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
4 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

15% escaped26 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
add_new_analytic (wp-headmaster.php:192)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Headmaster Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 24
actionadmin_menuwp-headmaster.php:34
actionadmin_initwp-headmaster.php:35
actionadmin_initwp-headmaster.php:36
filterplugin_action_linkswp-headmaster.php:39
actionwp_headwp-headmaster.php:46
actionwp_headwp-headmaster.php:50
actionwp_headwp-headmaster.php:56
actionwp_headwp-headmaster.php:62
actionwp_headwp-headmaster.php:68
actionwp_headwp-headmaster.php:74
actionwp_headwp-headmaster.php:80
actionwp_headwp-headmaster.php:81
actionwp_headwp-headmaster.php:87
actionwp_headwp-headmaster.php:93
actionwp_headwp-headmaster.php:98
actionwp_headwp-headmaster.php:104
actionwp_headwp-headmaster.php:110
actionwp_headwp-headmaster.php:116
actionwp_headwp-headmaster.php:122
actionadmin_initwp-headmaster.php:125
actionwp_headwp-headmaster.php:127
actionwp_headwp-headmaster.php:129
actionadd_meta_boxeswp-headmaster.php:313
actionsave_postwp-headmaster.php:314
Maintenance & Trust

WP Headmaster Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 21, 2014
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings4
Active installs200
Developer Profile

WP Headmaster Developer Profile

bavington

1 plugin · 200 total installs

69
trust score
Avg Security Score
64/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Headmaster

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-headmaster/wp-headmaster.css/wp-content/plugins/wp-headmaster/js/admin.js
Script Paths
//www.google-analytics.com/ga.js//www.google-analytics.com/analytics.js

HTML / DOM Fingerprints

JS Globals
_gaqga
FAQ

Frequently Asked Questions about WP Headmaster