Verse Of The Day Security & Risk Analysis

wordpress.org/plugins/wp-votd

Displays a daily bible verse on your site, using a Verse of the Day RSS feed.

10 active installs v3.0 PHP + WP 2.2+ Updated May 20, 2007
biblechristianversevotd
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Verse Of The Day Safe to Use in 2026?

Generally Safe

Score 85/100

Verse Of The Day has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 19yr ago
Risk Assessment

The wp-votd v3.0 plugin exhibits a generally strong security posture based on the provided static analysis. The absence of direct entry points like AJAX handlers, REST API routes, and shortcodes, combined with no identified dangerous functions, file operations, or external HTTP requests, suggests a limited attack surface. Furthermore, all SQL queries are reported to use prepared statements, which is a critical security best practice. The lack of any recorded vulnerabilities or CVEs in its history is also a positive indicator of its security maturity.

However, a significant concern arises from the output escaping analysis. With 7 total outputs and 0% properly escaped, this indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any data rendered by the plugin without proper sanitization and escaping could be exploited by attackers to inject malicious scripts. The absence of nonce and capability checks, while not directly tied to a tangible attack vector in the static analysis, implies that actions might not be adequately protected against CSRF or unauthorized access, especially if new entry points are introduced or internal functions are called directly. This combination of unescaped output presents the most immediate and critical risk.

In conclusion, while wp-votd v3.0 demonstrates good practices in areas like SQL handling and limiting its attack surface, the critical deficiency in output escaping severely undermines its overall security. The vulnerability history is reassuring, but it cannot compensate for the immediate XSS risk. Addressing the output escaping is paramount to improving its security. The lack of explicit authorization checks on the single cron event also warrants investigation.

Key Concerns

  • 0% output escaping
  • 0 Nonce checks
  • 0 Capability checks
  • 1 Cron event without apparent auth check
Vulnerabilities
None known

Verse Of The Day Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Verse Of The Day Release Timeline

v3.0Current
v2.6
v2.5
Code Analysis
Analyzed Mar 17, 2026

Verse Of The Day Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Verse Of The Day Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuplugin-base.php:12
actionwp_votd_update_contentswp-votd.php:38

Scheduled Events 1

wp_votd_update_contents
Maintenance & Trust

Verse Of The Day Maintenance & Trust

Maintenance Signals

WordPress version tested2.1
Last updatedMay 20, 2007
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Verse Of The Day Developer Profile

dalziel

6 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Verse Of The Day

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
votd-content
Data Attributes
id="votd"
Shortcode Output
<p id="votd">[TEXT] (<a href="[LINK]">[TITLE]</a>[VERSION])[ENCLOSURE]</p>
FAQ

Frequently Asked Questions about Verse Of The Day