WP Historical Weather Security & Risk Analysis

wordpress.org/plugins/wp-historical-weather

Historical Weather plugin for wordpress using Wunderground API.

10 active installs v1.0 PHP + WP 4.0+ Updated Sep 25, 2014
historicalweatherwunderground
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Historical Weather Safe to Use in 2026?

Generally Safe

Score 85/100

WP Historical Weather has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-historical-weather plugin v1.0 demonstrates a strong security posture based on the provided static analysis. It has zero identified dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. There are no known CVEs associated with this plugin, indicating a good track record of security. The limited attack surface, consisting of a single shortcode with no readily apparent authentication issues flagged in the static analysis, further contributes to its perceived safety.

However, a few areas warrant caution. The plugin performs a file operation and lacks nonce and capability checks for its entry points. While the static analysis doesn't explicitly flag a taint flow or a specific vulnerability related to these, the absence of these checks on a file operation is a potential concern. Without proper authorization and validation, file operations could theoretically be manipulated, although the severity of this risk is unclear without further context on the nature of the file operation and the data involved.

Overall, the plugin appears to be well-coded with good security practices, particularly regarding data handling and output. The lack of past vulnerabilities is a significant positive. The primary weaknesses lie in the missing security checks for file operations, which, while not explicitly exploited in the static analysis, represent a gap in robust security implementation.

Key Concerns

  • File operations without explicit checks
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP Historical Weather Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Historical Weather Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

WP Historical Weather Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[hw] hw.php:16
WordPress Hooks 2
actionwp_loadedhw.php:10
actionwp_enqueue_scriptshw.php:15
Maintenance & Trust

WP Historical Weather Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 25, 2014
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Historical Weather Developer Profile

iphoenix

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Historical Weather

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-historical-weather/css/weather-icons.css

HTML / DOM Fingerprints

CSS Classes
historicalweatherwgrouptimetsvrainsnowrainsnow
Shortcode Output
<div class="historicalweather"><div class="wgroup"><div class="wgroup"><hr><div class="tsv"<div class="rainsnow"
FAQ

Frequently Asked Questions about WP Historical Weather