WP Moon Phase Widget Security & Risk Analysis

wordpress.org/plugins/wp-moon-phase-widget

Moon phase widget for Wordpress

200 active installs v1.0.0 PHP 5.6+ WP 4.7+ Updated Dec 26, 2019
astrologyastronomymoonmoonphase
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Moon Phase Widget Safe to Use in 2026?

Generally Safe

Score 85/100

WP Moon Phase Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wp-moon-phase-widget" plugin v1.0.0 presents a generally positive security posture based on the static analysis. The absence of any detected dangerous functions, SQL injection vulnerabilities, or external HTTP requests is commendable. Furthermore, the plugin utilizes prepared statements for its SQL queries and appears to have a good level of output escaping, with 80% of detected outputs being properly escaped. The lack of any recorded vulnerabilities or CVEs in its history suggests a well-developed and maintained codebase.

However, a significant concern arises from the complete lack of capability checks and nonce checks. While the static analysis shows no direct entry points requiring authentication (AJAX, REST API, shortcodes, cron events), this doesn't guarantee future security if the plugin's functionality were to evolve. The complete absence of these security mechanisms, even with a seemingly small attack surface, represents a potential weakness that could be exploited if new features introduce such entry points without proper authorization checks. The lack of any taint analysis flows is also noted, though this might be due to the limited scope or complexity of the plugin's code.

In conclusion, the plugin demonstrates good coding practices in areas like SQL handling and output escaping, and its vulnerability-free history is a strong positive. Nevertheless, the complete omission of capability and nonce checks is a notable weakness. This indicates a potential blind spot in security implementation that, while not currently exploitable based on the provided data, could become a risk if the plugin is extended or modified in the future without addressing these fundamental security controls.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
  • 20% of outputs not properly escaped
Vulnerabilities
None known

WP Moon Phase Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Moon Phase Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

80% escaped20 total outputs
Attack Surface

WP Moon Phase Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwidgets_initwp-moon-phase-widget.php:51
actionwp_enqueue_scriptswp-moon-phase-widget.php:53
Maintenance & Trust

WP Moon Phase Widget Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedDec 26, 2019
PHP min version5.6
Downloads4K

Community Trust

Rating76/100
Number of ratings4
Active installs200
Developer Profile

WP Moon Phase Widget Developer Profile

Moon Organizer

1 plugin · 200 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Moon Phase Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-moon-phase-widget/js/automount.min.js
Script Paths
/wp-content/plugins/wp-moon-phase-widget/js/automount.min.js

HTML / DOM Fingerprints

Data Attributes
data-color
Shortcode Output
<div id='moon-phase-widget'
FAQ

Frequently Asked Questions about WP Moon Phase Widget