
WP Monsters Security & Risk Analysis
wordpress.org/plugins/wp-monstersWP Monsters allows to the bloggers to publish in a easy way their Pathfinder RPG home-brew monsters, weapons, spells, feats, ... in their blogs.
Is WP Monsters Safe to Use in 2026?
Generally Safe
Score 85/100WP Monsters has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The wp-monsters plugin v1.3.4 exhibits a mixed security posture. On the positive side, it demonstrates strong practices by avoiding dangerous functions, file operations, external HTTP requests, and SQL injection vulnerabilities through the consistent use of prepared statements. The plugin also has no known CVEs, indicating a history of security maturity or limited exposure. However, significant concerns arise from the static analysis. A substantial portion of output (59%) is not properly escaped, presenting a risk of Cross-Site Scripting (XSS) vulnerabilities. While the attack surface is currently small and appears to have no unprotected entry points based on this snapshot, the presence of 7 shortcodes means any future additions or modifications could introduce risks if not handled carefully.
The taint analysis, while limited in scope, revealed two flows with unsanitized paths. Although these are not classified as critical or high severity, they still represent a potential avenue for malicious input to be processed without proper sanitization, which could lead to unexpected behavior or security issues depending on the context of their use. The complete absence of nonce checks and capability checks across all entry points is a major weakness. This means that authenticated users, and potentially even unauthenticated ones depending on the shortcode implementation, could trigger actions intended for authorized personnel, leading to unauthorized modifications or data breaches.
In conclusion, while the plugin has strengths in areas like SQL security and a clean CVE history, the high percentage of unescaped output and the complete lack of nonce and capability checks are significant security concerns. These weaknesses introduce a substantial risk of XSS and privilege escalation vulnerabilities. The taint analysis, though minor in severity here, warrants further investigation into the specific unsanitized path flows.
Key Concerns
- Unescaped output found
- Missing nonce checks
- Missing capability checks
- Taint flow with unsanitized path
- Taint flow with unsanitized path
WP Monsters Security Vulnerabilities
WP Monsters Code Analysis
Output Escaping
Data Flow Analysis
WP Monsters Attack Surface
Shortcodes 7
WordPress Hooks 104
Maintenance & Trust
WP Monsters Maintenance & Trust
Maintenance Signals
Community Trust
WP Monsters Alternatives
RGPD Fields Registration Form
rgpd-fields-registration-form
With this plugin you can add some extra fields on your default registration form of WordPress to adapt it to the GDPR.
MushRaider Bridge
mushraider-bridge
MushRaider Bridge is a plugin to integrate MushRaider raid planner into wordpress
Roller
roller
WordPress plugin for dice rolling, random lists, and conditional variables.
WordQuest
wordquest
What feature is WordPress severely lacking? Goblins. Dragons. Earn experience as you blog. Watch your avatar slowly grow in power with every post.
BLOGON QUEST
blogon-quest
This plugin changes your boring writing days to exciting RPG life.
WP Monsters Developer Profile
1 plugin · 10 total installs
How We Detect WP Monsters
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-monsters/img/monster.pngHTML / DOM Fingerprints
name="type"name="alignment"name="size"name="cr"[monster id="