
YAML Custom Fields Security & Risk Analysis
wordpress.org/plugins/yaml-custom-fieldsA WordPress plugin for managing YAML frontmatter schemas in theme templates and partials.
Is YAML Custom Fields Safe to Use in 2026?
Generally Safe
Score 100/100YAML Custom Fields has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "yaml-custom-fields" v1.2.7 plugin exhibits a generally good security posture based on the static analysis. All identified entry points, including AJAX handlers, are protected by authentication and capability checks. The plugin also demonstrates strong output escaping practices with 92% of outputs properly escaped, and it diligently uses nonces. The absence of any recorded historical vulnerabilities or CVEs further contributes to a positive security outlook.
However, a significant concern arises from the static analysis revealing that 100% of the 4 SQL queries do not use prepared statements. This is a critical weakness as it exposes the plugin to SQL injection vulnerabilities, especially if any of the input data processed by these queries is user-controlled. Additionally, the taint analysis identified one flow with unsanitized paths, which could potentially lead to directory traversal or file inclusion vulnerabilities if not handled carefully, although it is not flagged as critical or high severity. The plugin also performs file operations, the nature of which, if insecurely handled, could pose a risk.
While the plugin's proactive use of nonces, capability checks, and output escaping are commendable, the lack of prepared statements for SQL queries and the presence of an unsanitized path flow are notable risks that warrant attention. The clean vulnerability history is a strength, suggesting a potentially well-maintained codebase, but it does not negate the identified code-level risks. Overall, the plugin is well-structured with good defensive coding, but the SQL query handling and the identified taint flow are areas that require immediate review and remediation to ensure a truly secure implementation.
Key Concerns
- SQL queries without prepared statements
- Flows with unsanitized paths
YAML Custom Fields Security Vulnerabilities
YAML Custom Fields Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
YAML Custom Fields Attack Surface
AJAX Handlers 13
WordPress Hooks 25
Maintenance & Trust
YAML Custom Fields Maintenance & Trust
Maintenance Signals
Community Trust
YAML Custom Fields Alternatives
Add Custom Fields to Media
add-custom-fields-to-media
Add custom fields to media uploader and access them in template files. Great for copyrights, image meta etc.
Custom Field Builder – WordPress custom fields plugin
custom-field-builder
Custom Field Builder is a powerful and lightweight developer plugin to create custom meta boxes and custom fields for WordPress.
Display Custom Fields
display-custom-fields
This plugin allows you to display the value of a custom field on a page or post. Permitted values are raw text, html, javascript, javascript file url, …
Meta Extension
meta-extensions
Allows adding custom form fields to posts, storing them in custom meta fields. Integrates NGG, WT, and WP-DM.
WP Search Include Meta Fields
wp-search-include-meta-fields
License: GPLv2 or later WordPress plugin to extend default search to include meta fields
YAML Custom Fields Developer Profile
1 plugin · 0 total installs
How We Detect YAML Custom Fields
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/yaml-custom-fields/build/admin/css/admin-style.css/wp-content/plugins/yaml-custom-fields/build/admin/js/admin-script.js/wp-content/plugins/yaml-custom-fields/build/admin/js/yaml-fields-editor.js/wp-content/plugins/yaml-custom-fields/build/admin/js/yaml-fields-admin.js/wp-content/plugins/yaml-custom-fields/build/frontend/css/frontend-style.css/wp-content/plugins/yaml-custom-fields/build/frontend/js/frontend-script.js/wp-content/plugins/yaml-custom-fields/build/admin/js/admin-script.js/wp-content/plugins/yaml-custom-fields/build/admin/js/yaml-fields-editor.js/wp-content/plugins/yaml-custom-fields/build/admin/js/yaml-fields-admin.js/wp-content/plugins/yaml-custom-fields/build/frontend/js/frontend-script.jsyaml-custom-fields/build/admin/css/admin-style.css?ver=yaml-custom-fields/build/admin/js/admin-script.js?ver=yaml-custom-fields/build/admin/js/yaml-fields-editor.js?ver=yaml-custom-fields/build/admin/js/yaml-fields-admin.js?ver=yaml-custom-fields/build/frontend/css/frontend-style.css?ver=yaml-custom-fields/build/frontend/js/frontend-script.js?ver=HTML / DOM Fingerprints
yaml-cf-editoryaml-cf-field-wrapperyaml-cf-field-labelyaml-cf-field-inputyaml-cf-field-descriptionyaml-cf-nested-fieldsyaml-cf-add-field-buttonyaml-cf-remove-field-button+1 more<!-- YAML Custom Fields Start --><!-- YAML Custom Fields End --><!-- YAML Custom Fields Field Start: [field_name] --><!-- YAML Custom Fields Field End: [field_name] -->data-yaml-cf-field-typedata-yaml-cf-field-namedata-yaml-cf-field-optionsyamlCFAdminyamlCFEditor