WP Owner Mark Security & Risk Analysis

wordpress.org/plugins/wp-owner-mark

Add Blog Owner Mark into your blog's comments.

10 active installs v1.0.7 PHP + WP 3.0+ Updated Mar 10, 2014
commentsmarkowner
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Owner Mark Safe to Use in 2026?

Generally Safe

Score 85/100

WP Owner Mark has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "wp-owner-mark" plugin version 1.0.7 exhibits a generally strong security posture based on the provided static analysis. There are no identified entry points for external interaction such as AJAX handlers, REST API routes, or shortcodes that are not protected by authentication checks. Furthermore, the absence of dangerous functions, SQL queries without prepared statements, and file operations indicate good coding practices in these critical areas. The plugin also appears to have no known vulnerabilities or historical CVEs, suggesting a stable and secure development history.

Despite these strengths, a significant concern arises from the output escaping analysis. With one total output identified and 0% properly escaped, this presents a potential risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed to users that is not properly escaped can be manipulated by attackers to inject malicious scripts. The lack of nonce checks and capability checks across all entry points, while mitigated by the absence of unprotected entry points, still represents a missed opportunity for enhanced security against certain types of attacks if the attack surface were to expand in future versions.

In conclusion, the plugin is currently in a strong security state due to its minimal attack surface and secure handling of SQL and file operations. However, the unescaped output is a critical weakness that needs immediate attention to prevent potential XSS attacks. Addressing this specific issue would further solidify its security profile.

Key Concerns

  • Unescaped output detected
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

WP Owner Mark Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Owner Mark Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

WP Owner Mark Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptswp-owner-mark.php:40
filterget_comment_author_linkwp-owner-mark.php:49
Maintenance & Trust

WP Owner Mark Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedMar 10, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

WP Owner Mark Developer Profile

Arefly

24 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Owner Mark

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-owner-mark/style.min.css
Version Parameters
wp-owner-mark/style.min.css?ver=

HTML / DOM Fingerprints

CSS Classes
admin_mark
FAQ

Frequently Asked Questions about WP Owner Mark