WP Simple Mourning Security & Risk Analysis

wordpress.org/plugins/wp-simple-mouring

Simple implementation of mourning in your page. Grey out your website.

20 active installs v1.0 PHP 5.6+ WP 4.9+ Updated Jan 22, 2019
black-pagecssgrayscalemourningzaloba
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is WP Simple Mourning Safe to Use in 2026?

Generally Safe

Score 85/100

WP Simple Mourning has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The wp-simple-mourning v1.0 plugin exhibits a strong security posture based on the static analysis. The absence of any identified attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events, significantly limits potential entry points for attackers. Furthermore, the code shows positive signs with a high percentage of SQL queries utilizing prepared statements and a single nonce check present, indicating an awareness of common security practices. The taint analysis revealing no unsanitized flows further reinforces this positive outlook.

However, there are areas that warrant attention. The extremely low percentage (20%) of properly escaped outputs is a significant concern. This suggests that user-supplied data or data processed by the plugin might be outputted without proper sanitization, leaving the plugin susceptible to Cross-Site Scripting (XSS) vulnerabilities. The complete lack of capability checks is also a notable weakness, as it implies that any action performed by the plugin might not be properly authorized, potentially allowing unauthorized users to trigger plugin functionality.

Compounding these code-level observations is the complete absence of any recorded vulnerability history. While this is generally a positive indicator, it could also suggest that the plugin has not been subjected to extensive security auditing or has a very limited user base, which might mean vulnerabilities have simply gone unnoticed. In conclusion, the plugin demonstrates strengths in limiting its attack surface and employing secure SQL practices, but the significant lack of output escaping and capability checks presents critical risks that need to be addressed.

Key Concerns

  • Insufficient output escaping
  • Missing capability checks
Vulnerabilities
None known

WP Simple Mourning Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Simple Mourning Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
6 prepared
Unescaped Output
4
1 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

86% prepared7 total queries

Output Escaping

20% escaped5 total outputs
Attack Surface

WP Simple Mourning Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuwp-simple-mouring.php:101
actioninitwp-simple-mouring.php:173
Maintenance & Trust

WP Simple Mourning Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedJan 22, 2019
PHP min version5.6
Downloads1K

Community Trust

Rating80/100
Number of ratings2
Active installs20
Developer Profile

WP Simple Mourning Developer Profile

montowniastron

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Simple Mourning

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-simple-mouring/css/wp-simple-mouring-style.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Simple Mourning