WP-Whoami Security & Risk Analysis

wordpress.org/plugins/wp-whoami

Just another widget to show a photo, a bio and some social media links with nice webfont-icons

10 active installs v0.4 PHP + WP 3.1+ Updated Unknown
authorbiosocial-mediawidget
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP-Whoami Safe to Use in 2026?

Generally Safe

Score 100/100

WP-Whoami has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The wp-whoami v0.4 plugin presents a mixed security picture. On one hand, the static analysis indicates a very small attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are directly exposed or lack authentication checks. Furthermore, all SQL queries are correctly implemented using prepared statements, and there are no file operations or external HTTP requests, which significantly reduces common attack vectors. The absence of known vulnerabilities in its history is also a positive sign.

However, significant concerns arise from the code analysis. The presence of the `create_function` is a critical security anti-pattern in PHP, as it can lead to arbitrary code execution if its arguments are not rigorously sanitized. Additionally, the extremely low percentage (13%) of properly escaped outputs indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the site's output.

Given the absence of known CVEs, the plugin appears to have been relatively stable. However, the identified code signals, particularly `create_function` and the poor output escaping, represent substantial security weaknesses that could be exploited by attackers. The plugin's strengths lie in its limited attack surface and secure database interactions, but these are overshadowed by the potential for code execution and XSS due to insecure coding practices.

Key Concerns

  • Use of dangerous function 'create_function'
  • Low percentage of properly escaped outputs
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

WP-Whoami Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP-Whoami Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
7
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action( 'widgets_init', create_function( '', 'return register_widget( "Whoami_Widget" );' ) );whoami.php:80

Output Escaping

13% escaped8 total outputs
Attack Surface

WP-Whoami Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionwidgets_initwhoami.php:80
filteruser_contactmethodswhoami.php:87
actionadmin_initwhoami.php:124
actionwp_enqueue_scriptswhoami.php:132
Maintenance & Trust

WP-Whoami Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

WP-Whoami Developer Profile

Dennis Ploetner

4 plugins · 4K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP-Whoami

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-whoami/css/style.css

HTML / DOM Fingerprints

CSS Classes
socialicons
Data Attributes
rel="me"
FAQ

Frequently Asked Questions about WP-Whoami