Random Feeds Security & Risk Analysis

wordpress.org/plugins/wp-random-feeds

Randomize your feeds for deploy to another web applications.

10 active installs v0.1 PHP + WP 2.3+ Updated May 20, 2010
feedfeed-readerfeedsrandom-feedswp-feed
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Random Feeds Safe to Use in 2026?

Generally Safe

Score 85/100

Random Feeds has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "wp-random-feeds" v0.1 plugin exhibits a generally weak security posture, despite the absence of known CVEs and critical taint flows. The static analysis reveals significant concerns regarding output escaping, with 100% of detected outputs being unescaped. This represents a considerable risk for cross-site scripting (XSS) vulnerabilities, as any data displayed by the plugin could potentially be manipulated by attackers to inject malicious scripts. Furthermore, the complete lack of nonce checks and capability checks is a major weakness. While the attack surface appears small (0 AJAX, 0 REST API, etc.), any future additions or modifications to the plugin that introduce these entry points without proper authentication and authorization would immediately become exploitable. The plugin's vulnerability history is clean, which is positive, but this can also be misleading as the code itself contains clear, inherent security flaws that haven't yet been exploited or publicly identified. In conclusion, while the plugin currently lacks known vulnerabilities and has a minimal attack surface, the unescaped outputs and absence of fundamental security checks (nonces, capabilities) present a significant and immediate risk that requires remediation.

Key Concerns

  • Unescaped output (3 total)
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Random Feeds Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Random Feeds Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
wprf_admin (wp-random-feed.php:25)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Random Feeds Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuwp-random-feed.php:59
filterpre_get_postswp-random-feed.php:71
actiondo_feedwp-random-feed.php:73
actiondo_feed_rdfwp-random-feed.php:74
actiondo_feed_rsswp-random-feed.php:75
actiondo_feed_rss2wp-random-feed.php:76
actiondo_feed_atomwp-random-feed.php:77
Maintenance & Trust

Random Feeds Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedMay 20, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Random Feeds Developer Profile

Dragos Schiopu

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Random Feeds

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-random-feeds/wp-random-feed.php

HTML / DOM Fingerprints

CSS Classes
wrap
Data Attributes
name="wprf_form"name="wprf_hidden"value="Y"
FAQ

Frequently Asked Questions about Random Feeds