WP Horoscope Security & Risk Analysis

wordpress.org/plugins/wp-horoscope

WP Horoscope - Cung hoàng đạo cho wordpress giúp hiển thị thông tin trong ngày của các cung hoàng đạo.

10 active installs v1.0.0 PHP + WP 3.0.1+ Updated Sep 17, 2014
horoscopeshortcutwidget
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Horoscope Safe to Use in 2026?

Generally Safe

Score 85/100

WP Horoscope has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The wp-horoscope plugin version 1.0.0 exhibits a mixed security posture. On the positive side, it has a minimal attack surface with only one shortcode and no AJAX handlers, REST API routes, or cron events that are exposed without authentication. The absence of known historical vulnerabilities (CVEs) is also a positive indicator, suggesting a generally stable codebase or a lack of public scrutiny to date.

However, significant concerns arise from the static code analysis. The plugin utilizes raw SQL queries without any prepared statements, which is a major vulnerability risk, especially when combined with taint analysis indicating four flows with unsanitized paths. While no critical or high severity taint flows are explicitly categorized, the presence of unsanitized paths in raw SQL queries points to a high likelihood of SQL injection vulnerabilities. Furthermore, a very low percentage (19%) of output is properly escaped, meaning stored or reflected cross-site scripting (XSS) vulnerabilities are a strong possibility, particularly when user-supplied data is involved in the shortcode or SQL queries.

The lack of capability checks is also a concern, as it implies that the plugin's functionality might be accessible to users who should not have access, although the limited attack surface mitigates this risk somewhat. In conclusion, while the plugin's limited attack surface and clean vulnerability history are strengths, the severe lack of SQL statement preparation and insufficient output escaping, coupled with unsanitized path taint flows, present substantial security risks that require immediate attention.

Key Concerns

  • Raw SQL queries without prepared statements
  • Unsanitized paths in taint flows (4 flows)
  • Low percentage of properly escaped output
  • Lack of capability checks
Vulnerabilities
None known

WP Horoscope Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Horoscope Code Analysis

Dangerous Functions
0
Raw SQL Queries
4
0 prepared
Unescaped Output
22
5 escaped
Nonce Checks
2
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared4 total queries

Output Escaping

19% escaped27 total outputs
Data Flows
4 unsanitized

Data Flow Analysis

4 flows4 with unsanitized paths
form_handler (scb\AdminPage.php:196)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Horoscope Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[horoscope] shortcode.php:3
WordPress Hooks 14
action_admin_menuscb\AdminPage.php:58
actionadmin_initscb\AdminPage.php:116
actionadmin_noticesscb\AdminPage.php:117
actionadmin_menuscb\AdminPage.php:120
filtercontextual_helpscb\AdminPage.php:121
actionadmin_noticesscb\AdminPage.php:215
filtercron_schedulesscb\Cron.php:57
actionactivate_pluginscb\load.php:32
actionplugins_loadedscb\load.php:38
actionload-post.phpscb\PostMetabox.php:30
actionload-post-new.phpscb\PostMetabox.php:31
actionadd_meta_boxesscb\PostMetabox.php:44
actionsave_postscb\PostMetabox.php:45
actionwidgets_initscb\Widget.php:13
Maintenance & Trust

WP Horoscope Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedSep 17, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Horoscope Developer Profile

Duoc Nguyen

5 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Horoscope

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-horoscope/css/wp-horoscope.css
Version Parameters
wp-horoscope/css/wp-horoscope.css?ver=

HTML / DOM Fingerprints

CSS Classes
zodiac-widgetzodiac-imagezodiac-namezodiac-content
Data Attributes
data-zodiac-namedata-zodiac-imagedata-zodiac-contentdata-zodiac-id
JS Globals
window.jQuerywindow.postboxes
Shortcode Output
<div class="zodiac-widget"<img class="zodiac-image"<span class="zodiac-name"<p class="zodiac-content"
FAQ

Frequently Asked Questions about WP Horoscope