WP-PluginsUsed Security & Risk Analysis

wordpress.org/plugins/wp-pluginsused

Display WordPress plugins that you currently have (both active and inactive) onto a post/page.

70 active installs v1.50.2 PHP + WP 2.8+ Updated Aug 9, 2023
plugin-usedpluginsplugins-useduseused
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-PluginsUsed Safe to Use in 2026?

Generally Safe

Score 85/100

WP-PluginsUsed has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "wp-pluginsused" plugin v1.50.2 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, SQL queries without prepared statements, file operations, and external HTTP requests are all positive indicators. Furthermore, the plugin's attack surface is limited to three shortcodes, and critically, none of these entry points are identified as unprotected. The taint analysis also shows no critical or high-severity flows, which is a significant strength.

However, there are a few areas that warrant attention. The plugin does not implement nonce checks or capability checks on its entry points. While the current attack surface is small and no immediate vulnerabilities are apparent in the static analysis, the lack of these fundamental security checks means that if the plugin's functionality were to evolve and expose more sensitive operations or data, it could become susceptible to certain types of attacks without proper authorization enforcement. The vulnerability history is clean, with no recorded CVEs, which is a positive sign of its past security performance.

In conclusion, "wp-pluginsused" v1.50.2 appears to be a securely coded plugin in its current state, with no critical or high-risk issues identified in the static analysis or vulnerability history. The primary concern lies in the absence of nonce and capability checks, which represents a potential future risk if the plugin's attack surface or functionality expands. The plugin's developers have demonstrated good practices in other areas, suggesting a commitment to security, but this oversight should be addressed for robust, long-term security.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Potential for unsanitized output
Vulnerabilities
None known

WP-PluginsUsed Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WP-PluginsUsed Release Timeline

v1.50
v1.40
v1.31
v1.30
v1.00
Code Analysis
Analyzed Mar 16, 2026

WP-PluginsUsed Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

WP-PluginsUsed Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[stats_pluginsused] wp-pluginsused.php:216
[active_pluginsused] wp-pluginsused.php:217
[inactive_pluginsused] wp-pluginsused.php:218
WordPress Hooks 1
actioninitwp-pluginsused.php:41
Maintenance & Trust

WP-PluginsUsed Maintenance & Trust

Maintenance Signals

WordPress version tested6.3.8
Last updatedAug 9, 2023
PHP min version
Downloads32K

Community Trust

Rating96/100
Number of ratings4
Active installs70
Developer Profile

WP-PluginsUsed Developer Profile

Lester Chan

20 plugins · 888K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
1377 days
View full developer profile
Detection Fingerprints

How We Detect WP-PluginsUsed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-pluginsused/images/plugin_active.gif/wp-content/plugins/wp-pluginsused/images/plugin_inactive.gif

HTML / DOM Fingerprints

Shortcode Output
[pluginsused][pluginsused type='active'][pluginsused type='inactive'][pluginsused type='stats']
FAQ

Frequently Asked Questions about WP-PluginsUsed