Coronavirus Update Security & Risk Analysis

wordpress.org/plugins/yatko-coronavirus

Coronavirus Update: WordPress Plugin and Widget with coronavirus tracker. Cases by country and by state. Free COVID-19 live update for WordPress.

10 active installs v1.1.2 PHP 5.6+ WP 5.0+ Updated Apr 1, 2020
corona-viruscoronaviruscountrycovid-19state
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Coronavirus Update Safe to Use in 2026?

Generally Safe

Score 85/100

Coronavirus Update has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "yatko-coronavirus" plugin, version 1.1.2, presents significant security concerns despite a lack of recorded vulnerabilities. The static analysis reveals two unprotected AJAX handlers, which represent a substantial attack surface. Without proper authentication or capability checks on these entry points, any unauthenticated user could potentially trigger unintended functionality, leading to various exploits. The low percentage of properly escaped output (42%) further exacerbates this risk, as it increases the likelihood of cross-site scripting (XSS) vulnerabilities if user-supplied data is processed and displayed without adequate sanitization.

The plugin's code signals do indicate some positive security practices, such as the complete use of prepared statements for SQL queries, which mitigates SQL injection risks. However, this strength is overshadowed by the critical weaknesses in handling AJAX requests and output escaping. The absence of any known vulnerabilities or CVEs in its history is noteworthy, but it does not guarantee future security, especially given the identified insecure code patterns. The lack of taint analysis data is a gap, but the direct exposure of AJAX handlers and poor output sanitization are sufficient indicators of risk.

In conclusion, the "yatko-coronavirus" plugin has a concerning security posture due to its unprotected AJAX handlers and insufficient output escaping. While it demonstrates good practices in SQL query handling and has no recorded vulnerability history, these strengths are outweighed by the high potential for exploitation through its exposed entry points and XSS vulnerabilities. It is strongly recommended that these security flaws be addressed promptly.

Key Concerns

  • Unprotected AJAX handlers (2)
  • Insufficient output escaping (58%)
  • Missing nonce checks on AJAX
  • Missing capability checks on AJAX
Vulnerabilities
None known

Coronavirus Update Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Coronavirus Update Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
22
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Output Escaping

42% escaped38 total outputs
Attack Surface
2 unprotected

Coronavirus Update Attack Surface

Entry Points2
Unprotected2

AJAX Handlers 2

authwp_ajax_feed_updatequarantine.php:20
noprivwp_ajax_feed_updatequarantine.php:21
WordPress Hooks 2
actionadmin_initquarantine.php:18
actionwidgets_initquarantine.php:19
Maintenance & Trust

Coronavirus Update Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 1, 2020
PHP min version5.6
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Coronavirus Update Developer Profile

Yatko

6 plugins · 60 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Coronavirus Update

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/yatko-coronavirus/assets/styles/feed.css/wp-content/plugins/yatko-coronavirus/assets/js/feed.js
Script Paths
/wp-content/plugins/yatko-coronavirus/assets/js/feed.js

HTML / DOM Fingerprints

Data Attributes
data-region
JS Globals
xhr
REST Endpoints
/wp-json/quarantine/v1/feed
FAQ

Frequently Asked Questions about Coronavirus Update