WPO365 | SAMESITE Security & Risk Analysis

wordpress.org/plugins/wpo365-samesite

Plugin for WordPress websites that require a user to sign in (e.g. with Microsoft using the WPO365 plugin) and that are loaded inside an iframe (e.g.

200 active installs v1.5 PHP 7.4+ WP 5.0+ Updated Jan 20, 2025
cookiesmicrosoft-teamssamesiteteams
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPO365 | SAMESITE Safe to Use in 2026?

Generally Safe

Score 92/100

WPO365 | SAMESITE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The static analysis of the 'wpo365-samesite' plugin v1.5 reveals a strong security posture based on the provided metrics. The plugin exhibits zero entry points through AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits its attack surface. Furthermore, the absence of dangerous functions, the exclusive use of prepared statements for any SQL queries, and the proper escaping of all output signals diligent coding practices. The lack of file operations, external HTTP requests, nonce checks, and capability checks, while contributing to a reduced attack surface, also points to potentially limited functionality or reliance on external frameworks for these operations, which could be a concern if not managed properly.

The taint analysis shows no identified flows with unsanitized paths, and importantly, no known vulnerabilities or CVEs have been recorded for this plugin. This history suggests a well-maintained and secure codebase. The absence of capability checks across all entry points, though not explicitly flagged as a vulnerability in the provided data, is a notable observation. While the current analysis shows no unprotected entry points, as the plugin has zero entry points, this lack of capability checks might become a concern if new entry points are introduced without proper authorization checks.

In conclusion, based on the provided static analysis and vulnerability history, 'wpo365-samesite' v1.5 appears to be a highly secure plugin. Its minimal attack surface, adherence to secure coding practices for database operations and output handling, and a clean vulnerability history are significant strengths. The primary area of note is the absence of capability checks, which, in the absence of any entry points, poses no immediate risk but warrants attention should the plugin evolve to include user-facing interactions that require authorization.

Key Concerns

  • No capability checks implemented
Vulnerabilities
None known

WPO365 | SAMESITE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPO365 | SAMESITE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

WPO365 | SAMESITE Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

WPO365 | SAMESITE Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 20, 2025
PHP min version7.4
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

WPO365 | SAMESITE Developer Profile

Marco van Wieren

4 plugins · 22K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
385 days
View full developer profile
Detection Fingerprints

How We Detect WPO365 | SAMESITE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPO365 | SAMESITE