WPML Widgets Security & Risk Analysis

wordpress.org/plugins/wpml-widgets

WPML Widgets is a simple to use extension to add a language selector dropdown to your widgets.

10K active installs v1.0.6 PHP + WP 3.6+ Updated Nov 28, 2017
wordpress-multilanguagewordpress-multilanguage-widgetwpmlwpml-widgetwpml-widget-selector
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPML Widgets Safe to Use in 2026?

Generally Safe

Score 85/100

WPML Widgets has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "wpml-widgets" plugin v1.0.6 exhibits a seemingly strong security posture based on the provided static analysis and vulnerability history. The absence of identified AJAX handlers, REST API routes, shortcodes, cron events, dangerous functions, file operations, external HTTP requests, nonces, and capability checks, along with the complete use of prepared statements for SQL queries, are all positive indicators. The lack of recorded vulnerabilities or known CVEs further suggests a history of responsible development or a very low impact profile.

However, the static analysis also reveals potential areas for concern. With 50% of output not properly escaped, there's a moderate risk of cross-site scripting (XSS) vulnerabilities if the unescaped output involves user-supplied data. The absence of nonce and capability checks on any potential entry points, although there are currently none identified, means that if new entry points are introduced in the future without proper security measures, they could be immediately exploitable. The lack of taint analysis results is also noteworthy; while it could indicate no critical issues were found, it might also mean the analysis was incomplete or not performed for certain code paths.

In conclusion, the plugin currently presents a low direct risk due to its minimal attack surface and clean vulnerability history. The primary weakness lies in the incomplete output escaping, which could lead to XSS if the plugin evolves. Developers should prioritize addressing the unescaped output and ensure any future additions to the attack surface include robust nonce and capability checks.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

WPML Widgets Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

WPML Widgets Release Timeline

v1.0.6Current
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
Code Analysis
Analyzed Mar 16, 2026

WPML Widgets Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

WPML Widgets Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_noticeswpml-widgets.php:71
actionin_widget_formwpml-widgets.php:77
filterwidget_update_callbackwpml-widgets.php:80
filterwidget_display_callbackwpml-widgets.php:83
Maintenance & Trust

WPML Widgets Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedNov 28, 2017
PHP min version
Downloads172K

Community Trust

Rating98/100
Number of ratings36
Active installs10K
Developer Profile

WPML Widgets Developer Profile

Jeroen Sormani

10 plugins · 92K total installs

84
trust score
Avg Security Score
94/100
Avg Patch Time
35 days
View full developer profile
Detection Fingerprints

How We Detect WPML Widgets

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPML Widgets