WP Mega Security & Risk Analysis

wordpress.org/plugins/wp-mega

WP Mega is a light but powerful plugin that can replace many plugins and make your site securer, faster, and smoother. Core features: Post Views Count …

10 active installs v1.0 PHP 5.0+ WP 3.0+ Updated Aug 14, 2018
admin-bardashboardfacebook-commentpost-views-counterviews-counter
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Mega Safe to Use in 2026?

Generally Safe

Score 85/100

WP Mega has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The 'wp-mega' v1.0 plugin exhibits a mixed security posture. On the positive side, there are no known vulnerabilities (CVEs) associated with this plugin, and the static analysis shows a notable absence of dangerous functions, file operations, and external HTTP requests. Furthermore, the plugin incorporates nonce and capability checks, which are good practices for securing entry points. However, the analysis does reveal significant concerns within the code itself. A concerning 50% of SQL queries are not using prepared statements, posing a risk of SQL injection if user input is not meticulously handled elsewhere. The output escaping is also very poor, with only 7% of outputs properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis, while showing no critical or high severity issues, did identify two flows with unsanitized paths, which is a precursor to potential security problems if these paths are exposed to user input without proper sanitization. The lack of historical vulnerabilities could indicate good coding practices or simply a lack of in-depth security auditing over time. Overall, while the plugin avoids some common pitfalls and has a clean vulnerability history, the internal code quality, particularly regarding SQL and output sanitization, presents substantial risks that need immediate attention.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of properly escaped output
  • Flows with unsanitized paths
Vulnerabilities
None known

WP Mega Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Mega Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
1 prepared
Unescaped Output
13
1 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared2 total queries

Output Escaping

7% escaped14 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
footer_content (inc\class\class-wp-mega-log-redirect.php:17)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Mega Attack Surface

Entry Points7
Unprotected0

AJAX Handlers 2

authwp_ajax_wp_mega_admin_ajaxinc\class\admin\class-wp-mega-admin-ajax.php:9
noprivwp_ajax_wp_mega_admin_ajaxinc\class\admin\class-wp-mega-admin-ajax.php:10

Shortcodes 5

[show_post_content] inc\class\class-wp-mega-spca.php:10
[SPC] inc\class\class-wp-mega-spca.php:11
[spc] inc\class\class-wp-mega-spca.php:12
[spca] inc\class\class-wp-mega-spca.php:13
[simple_views_counter] inc\class\class-wp-mega-views-counter.php:13
WordPress Hooks 20
actionadmin_initinc\class\admin\class-codist-admin-panel.php:11
actionadmin_menuinc\class\admin\class-wp-mega-admin.php:11
actionadmin_footerinc\class\admin\class-wp-mega-admin.php:12
actionadmin_footerinc\class\admin\class-wp-mega-admin.php:13
actioninitinc\class\class-wp-mega-admin-bar.php:12
filtershow_admin_barinc\class\class-wp-mega-admin-bar.php:24
actionadmin_initinc\class\class-wp-mega-dashboard-access.php:11
filterthe_contentinc\class\class-wp-mega-fb-comment.php:16
actionwp_headinc\class\class-wp-mega-header-footer.php:12
actionwp_footerinc\class\class-wp-mega-header-footer.php:13
actionwp_logininc\class\class-wp-mega-log-redirect.php:12
actionwp_logoutinc\class\class-wp-mega-log-redirect.php:13
actionwp_footerinc\class\class-wp-mega-log-redirect.php:14
actioninitinc\class\class-wp-mega-remove-filter.php:10
filterscript_loader_srcinc\class\class-wp-mega-remove-version.php:15
filterstyle_loader_srcinc\class\class-wp-mega-remove-version.php:16
actionadmin_initinc\class\class-wp-mega-reveal-id.php:10
actionwp_footerinc\class\class-wp-mega-views-counter.php:11
actionthe_contentinc\class\class-wp-mega-views-counter.php:12
actionadmin_initinc\class\class-wp-mega-views-counter.php:14
Maintenance & Trust

WP Mega Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedAug 14, 2018
PHP min version5.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP Mega Developer Profile

Mohammad Nur Hossain

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Mega

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
codist-admin-panel-wrapcodist-col-codist-admin-loadingcodist-admin-updatedheader-wrapsidebar-wrapcontent-wrapcodist-admin-menu-wrap+7 more
Data Attributes
data-wp-noncedata-admin-ajax-url
JS Globals
_wpnonceADMIN_AJAX_URL
FAQ

Frequently Asked Questions about WP Mega