WP Helper Security & Risk Analysis

wordpress.org/plugins/wp-helper

It provides additional functions and feature that allow you to simplify the development in your plugin new posttype, new taxonomies, new pages and me …

100 active installs v0.9 PHP + WP 3.0+ Updated May 23, 2013
attachementframeworkpluginsposttype
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Helper Safe to Use in 2026?

Generally Safe

Score 85/100

WP Helper has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "wp-helper" plugin v0.9 exhibits a mixed security posture. On one hand, it demonstrates good practices by avoiding common attack vectors like AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points. The absence of external HTTP requests and its use of prepared statements for all SQL queries are also significant strengths. However, the static analysis reveals concerning areas.

The presence of the `unserialize` function, especially when handling untrusted input, poses a significant risk, as indicated by the single high-severity taint flow. While the plugin has a clean vulnerability history, this does not negate the inherent risks associated with dangerous functions like `unserialize` when implemented without robust input validation and sanitization. The low percentage of properly escaped output further exacerbates this risk, as it opens the door to cross-site scripting (XSS) vulnerabilities.

In conclusion, "wp-helper" v0.9 has a low external attack surface and good SQL handling. However, the reliance on `unserialize` and insufficient output escaping are critical weaknesses that require immediate attention. The lack of known vulnerabilities is positive but does not excuse the presence of these dangerous code patterns. A thorough review and remediation of these identified risks are strongly recommended.

Key Concerns

  • High severity taint flow identified
  • Dangerous function 'unserialize' used
  • Low percentage of properly escaped output
  • No capability checks on entry points
Vulnerabilities
None known

WP Helper Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Helper Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
0 prepared
Unescaped Output
16
6 escaped
Nonce Checks
1
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$args = unserialize(get_option($name));helper_taxonomy.php:56
unserialize$args = unserialize(get_option($name));helper_taxonomy.php:64
unserialize$args = unserialize(get_option($name));helper_taxonomy.php:132

Output Escaping

27% escaped22 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
ah_taxonomy_save (helper_taxonomy.php:100)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Helper Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 22
actionadmin_inithelper_basic.php:553
actionadmin_enqueue_scriptshelper_basic.php:556
actionpost_edit_form_taghelper_basic.php:565
filterwp_footerhelper_debug.php:226
filteradmin_footerhelper_debug.php:227
actionwp_before_admin_bar_renderhelper_debug.php:228
actionplugins_loadedhelper_debug.php:229
actioninithelper_debug.php:230
actionsave_posthelper_posttype.php:321
actionadmin_inithelper_posttype.php:432
actionplugins_loadedhelper_posttype.php:433
actionsave_posthelper_posttype.php:434
filterwp_insert_post_datahelper_posttype.php:435
filterthe_posthelper_posttype.php:436
actionactivated_pluginhelper_posttype.php:437
actionrestrict_manage_postshelper_posttype.php:439
actioncurrent_screenhelper_posttype.php:440
filterget_the_termshelper_taxonomy.php:164
actionpost_edit_form_taghelper_taxonomy.php:165
actionactivated_pluginhelper_taxonomy.php:166
actioninithelper_taxonomy.php:167
actionadmin_menuhelper_taxonomy.php:168
Maintenance & Trust

WP Helper Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedMay 23, 2013
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

WP Helper Developer Profile

lucdecri

5 plugins · 320 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Helper

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-helper/css/helper_style.css/wp-content/plugins/wp-helper/js/helper_script.js
Script Paths
/wp-content/plugins/wp-helper/js/helper_script.js
Version Parameters
wp-helper/css/helper_style.css?ver=wp-helper/js/helper_script.js?ver=

HTML / DOM Fingerprints

CSS Classes
helper_panel
Data Attributes
name="page"
FAQ

Frequently Asked Questions about WP Helper