
wp-hefo | WordPress header & footer Security & Risk Analysis
wordpress.org/plugins/wp-hefoInjects HTML snippets into the header and the footer, to make them persistent across themes (theme-independent).
Is wp-hefo | WordPress header & footer Safe to Use in 2026?
Generally Safe
Score 85/100wp-hefo | WordPress header & footer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "wp-hefo" plugin version 0.2 exhibits a mixed security posture. On the positive side, the static analysis shows no obvious attack surface points such as unprotected AJAX handlers, REST API routes, or shortcodes. Furthermore, all SQL queries are properly prepared, and there are no external HTTP requests or bundled libraries to consider for outdated versions. The plugin also has a clean vulnerability history with no recorded CVEs, which generally suggests good security development practices or limited exposure.
However, there are significant concerns that temper this positive outlook. A striking finding is that 100% of the three identified output points are not properly escaped, posing a high risk of Cross-Site Scripting (XSS) vulnerabilities. Additionally, while the taint analysis shows no critical or high severity flows, there are two flows with unsanitized paths, indicating potential for unexpected behavior or security issues if these paths are ever exposed to user input. The complete lack of nonce checks and capability checks on any potential entry points, even though the stated attack surface is zero, is a concerning omission that could become a problem if functionality changes or is added without adequate security measures.
In conclusion, while the plugin appears to be designed with a limited attack surface and good SQL practices, the unescaped output is a critical weakness that needs immediate attention. The absence of any authorization checks, coupled with unsanitized path flows, represents a latent risk. Addressing the output escaping and considering the implications of missing authorization checks are paramount to improving its security.
Key Concerns
- Output not properly escaped
- Flows with unsanitized paths
- No nonce checks
- No capability checks
wp-hefo | WordPress header & footer Security Vulnerabilities
wp-hefo | WordPress header & footer Code Analysis
Output Escaping
Data Flow Analysis
wp-hefo | WordPress header & footer Attack Surface
WordPress Hooks 3
Maintenance & Trust
wp-hefo | WordPress header & footer Maintenance & Trust
Maintenance Signals
Community Trust
wp-hefo | WordPress header & footer Alternatives
Header Footer Code Manager
header-footer-code-manager
Easily add tracking code snippets, conversion pixels, or other scripts required by third party services for analytics, marketing, or chat features.
Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts
insert-php
Insert PHP, JavaScript, CSS, HTML, ads, and tracking code into WordPress headers, footers, pages, and content using conditional logic, without editing …
Add Custom Codes – Insert Header, Footer, Custom PHP Snippets, CSS, Javascript
add-custom-codes
Add custom codes to your wordpress site. A completely free plugin to add Custom PHP functions, HTML, CSS, Javascript, any other codes to your website.
WPCode – Insert Headers and Footers + Custom Code Snippets – WordPress Code Manager
insert-headers-and-footers
Easily add code snippets in WordPress. Insert header & footer scripts, add PHP code snippets with conditional logic, insert ads pixel code, and more.
ElementsKit Elementor Addons – Advanced Widgets & Templates Addons for Elementor
elementskit-lite
Join millions who empower their websites with ElementsKit Elementor Addons. Get templates, & 100+ widgets like header-footer, mega menu, custom widget
wp-hefo | WordPress header & footer Developer Profile
1 plugin · 10 total installs
How We Detect wp-hefo | WordPress header & footer
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
id="wp_head_html"id="wp_footer_html"