
WPS Bidouille Security & Risk Analysis
wordpress.org/plugins/wps-bidouilleWPS Bidouille provides information about your WordPress and contains optimization tools.
Is WPS Bidouille Safe to Use in 2026?
Generally Safe
Score 96/100WPS Bidouille has a strong security track record. Known vulnerabilities have been patched promptly.
The "wps-bidouille" plugin, version 1.33.3, presents a moderate security risk. While it demonstrates several positive security practices, such as a reasonable number of nonce and capability checks, and a majority of its SQL queries using prepared statements and output being properly escaped, there are significant concerns. The presence of an unprotected AJAX handler creates a direct attack vector that could be exploited by unauthenticated users. This is exacerbated by the plugin's history of vulnerabilities, particularly a high-severity missing authorization flaw and a medium-severity CSRF issue. Although there are no currently unpatched CVEs, the recurring patterns of authorization and CSRF vulnerabilities suggest potential weaknesses in how user actions are validated and secured. The single unsanitized path flow, while not classified as critical or high severity in the static analysis, also warrants attention as it could potentially lead to path traversal or file manipulation if exploited in conjunction with other vulnerabilities.
Key Concerns
- AJAX handler without authentication check
- Vulnerability history: 1 high severity CVE
- Vulnerability history: 1 medium severity CVE
- Taint flow with unsanitized path
- SQL queries: 43% prepared statements (potential for raw SQL)
- Output escaping: 61% properly escaped (potential for XSS)
WPS Bidouille Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
WPS Bidouille <= 1.33.1 - Missing Authorization
WPS Bidouille <= 1.12.2 - Multiple Cross-Site Request Forgery
WPS Bidouille Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
Data Flow Analysis
WPS Bidouille Attack Surface
AJAX Handlers 14
WordPress Hooks 80
Maintenance & Trust
WPS Bidouille Maintenance & Trust
Maintenance Signals
Community Trust
WPS Bidouille Alternatives
The Ultimate WordPress Toolkit – WP Extended
wpextended
SMTP Email, Maintenance Mode, Duplicate Posts & Pages, Duplicate menu, Code Snippets, SVG File upload, Disable Gutenberg, Limit Login Attempts &am …
Hibiscus Login As Customer for WooCommerce
hibiscus-login-as-customer
Securely log in as any WooCommerce customer and return to admin with one click.
Last Login Tracker & Redirect URL
last-login-tracker-redirect-url
Tracks user last login and allows redirection of 404 pages to the homepage.
Plug & Play
plug-and-play
Plug and Play our feautures and turn your WordPress Blog into a Highly Interactive, Elegant and Secure Blog.
Loginizer
loginizer
Loginizer is a WordPress security plugin which helps you fight against bruteforce attacks.
WPS Bidouille Developer Profile
9 plugins · 149K total installs
How We Detect WPS Bidouille
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wps-bidouille/assets/css/wps-bidouille-admin.css/wp-content/plugins/wps-bidouille/assets/js/wps-bidouille-admin.js/wp-content/plugins/wps-bidouille/assets/css/wps-bidouille.css/wp-content/plugins/wps-bidouille/assets/js/wps-bidouille.js/wp-content/plugins/wps-bidouille/assets/css/wps-bidouille-login.css/wp-content/plugins/wps-bidouille/assets/js/wps-bidouille-admin.js/wp-content/plugins/wps-bidouille/assets/js/wps-bidouille.jswps-bidouille/assets/css/wps-bidouille-admin.css?ver=wps-bidouille/assets/js/wps-bidouille-admin.js?ver=wps-bidouille/assets/css/wps-bidouille.css?ver=wps-bidouille/assets/js/wps-bidouille.js?ver=wps-bidouille/assets/css/wps-bidouille-login.css?ver=HTML / DOM Fingerprints
wps-bidouille-dashboard-widget<!-- Hide menu WPS --><!-- Exclude WPS_BIDOUILLE from caching WP Rocket -->data-wps-bidouille-ratedwps_bidouille_datawps_bidouille_ajax_object/wp-json/wps-bidouille/v1/settings