WP Lorem ipsum Security & Risk Analysis

wordpress.org/plugins/wp-lorem-ipsum

WP Lorem ipsum automatically create new fake posts to fill the database and get a very good impression for your website.

700 active installs v3.2 PHP + WP 4.0+ Updated Jul 21, 2021
databaselorem-ipsumpagepostpost-type
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Lorem ipsum Safe to Use in 2026?

Generally Safe

Score 85/100

WP Lorem ipsum has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "wp-lorem-ipsum" v3.2 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of identified vulnerabilities in its history, coupled with the zero count for dangerous functions and SQL injection risks (all queries use prepared statements), is a positive indicator. Furthermore, the plugin demonstrates good practices by implementing nonce and capability checks, and it does not appear to expose a significant attack surface through AJAX, REST API, shortcodes, or cron events without proper authorization.

However, there are some areas for improvement that introduce minor risks. The taint analysis revealing two flows with unsanitized paths, despite not reaching critical or high severity, warrants attention. Additionally, the output escaping is only properly implemented for 33% of the outputs, which could potentially lead to cross-site scripting (XSS) vulnerabilities if the unescaped data is rendered in a user-facing context. The external HTTP requests also represent a potential vector for supply chain attacks if the external resources are compromised. Overall, while the plugin is not currently exhibiting critical vulnerabilities, the identified taint flows and output escaping issues should be addressed to further enhance its security.

Key Concerns

  • Unsanitized paths in taint flows
  • Low percentage of properly escaped output
  • External HTTP requests present
Vulnerabilities
None known

WP Lorem ipsum Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Lorem ipsum Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
10
5 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
2
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

33% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
post_submit_save (admin\class-wpli-admin.php:169)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Lorem ipsum Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_enqueue_scriptsadmin\class-wpli-admin.php:14
actionadmin_menuadmin\class-wpli-admin.php:17
actionadmin_post_post_submitadmin\class-wpli-admin.php:20
actionplugins_loadedadmin\class-wpli-admin.php:345
Maintenance & Trust

WP Lorem ipsum Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJul 21, 2021
PHP min version
Downloads26K

Community Trust

Rating68/100
Number of ratings5
Active installs700
Developer Profile

WP Lorem ipsum Developer Profile

Matteo Manna

2 plugins · 21K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Lorem ipsum

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-lorem-ipsum/admin/css/style.css
Version Parameters
wp-lorem-ipsum/admin/css/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
li-form
Data Attributes
data-post-countdata-post-typedata-parasdata-post-statusdata-post-authordata-has-post-thumbnail
FAQ

Frequently Asked Questions about WP Lorem ipsum