Insert Code by Angie Makes Security & Risk Analysis

wordpress.org/plugins/wpc-insert-code

Easily insert HTML, Javascript, CSS, into the head and footer areas of your site.

900 active installs v1.2 PHP + WP 3.9.1+ Updated May 10, 2017
htmlinsert-cssinsert-htmlinsert-javascriptinsert-js
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Insert Code by Angie Makes Safe to Use in 2026?

Generally Safe

Score 85/100

Insert Code by Angie Makes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of 'wpc-insert-code' v1.2 reveals a plugin with a very limited attack surface. There are no detected AJAX handlers, REST API routes, shortcodes, or cron events, meaning there are no direct entry points for external interaction. Furthermore, the absence of dangerous functions, file operations, external HTTP requests, and SQL queries executed without prepared statements are strong indicators of good security practices in these critical areas. The plugin also reports no known vulnerabilities in its history, suggesting a history of responsible development.

However, a significant concern lies in the output escaping. With 40 total outputs and only 45% properly escaped, there is a substantial risk of cross-site scripting (XSS) vulnerabilities. This means that user-supplied input could potentially be rendered directly into the output without proper sanitization, allowing attackers to inject malicious scripts. The lack of nonce checks and capability checks, coupled with zero critical or high severity taint flows, suggests that while direct code execution or SQL injection might be mitigated by other factors, the possibility of XSS remains a notable weakness.

In conclusion, 'wpc-insert-code' v1.2 demonstrates a robust defense against many common web application vulnerabilities by minimizing its attack surface and employing prepared statements. The primary weakness is the insufficient output escaping, which presents a clear XSS risk. While its vulnerability history is clean, this does not negate the current findings of potential security flaws. The plugin's strengths are its limited interaction points and database query safety, but its weakness in output sanitization requires attention.

Key Concerns

  • Low output escaping rate
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Insert Code by Angie Makes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Insert Code by Angie Makes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
18 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

45% escaped40 total outputs
Attack Surface

Insert Code by Angie Makes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionadmin_enqueue_scriptsadmin\class-admin.php:63
actionadmin_menuadmin\class-admin.php:67
actionadmin_initadmin\class-admin.php:68
actioninitpublic\class-helper.php:42
actioninitpublic\class-init.php:77
actionwp_headpublic\class-init.php:83
actionwp_footerpublic\class-init.php:84
actionwpc_insert_code_top_of_pagepublic\class-init.php:85
actionwpc_insert_code_above_headerpublic\class-init.php:86
actionwpc_insert_code_below_headerpublic\class-init.php:87
actionwpc_insert_code_above_contentpublic\class-init.php:88
actionwpc_insert_code_below_contentpublic\class-init.php:89
filterwpc_insert_code_valuepublic\class-init.php:91
actionplugins_loadedwpc-insert-code.php:24
actionplugins_loadedwpc-insert-code.php:41
Maintenance & Trust

Insert Code by Angie Makes Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 10, 2017
PHP min version
Downloads26K

Community Trust

Rating100/100
Number of ratings2
Active installs900
Developer Profile

Insert Code by Angie Makes Developer Profile

Chris Baldelomar

5 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Insert Code by Angie Makes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpc-insert-code/assets/css/admin.css
Script Paths
/wp-content/plugins/wpc-insert-code/assets/js/admin.js
Version Parameters
wpc-insert-code/assets/css/admin.css?ver=wpc-insert-code/assets/js/admin.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Insert Code by Angie Makes