
YD Spread Parameter Security & Risk Analysis
wordpress.org/plugins/yd-spread-parameterTweaks URLs to keep and propagate a http get query parameter in all links site-wide ( like ?tpl=1 ).
Is YD Spread Parameter Safe to Use in 2026?
Generally Safe
Score 100/100YD Spread Parameter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "yd-spread-parameter" plugin v0.2.0 exhibits a mixed security posture. On the positive side, the static analysis reveals no identified vulnerabilities in its history, no dangerous functions are used, and all SQL queries utilize prepared statements. Furthermore, there are no file operations or external HTTP requests, and no bundled libraries are present, reducing potential attack vectors. The plugin also appears to have a very small attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are directly accessible or unprotected.
However, significant concerns arise from the output escaping and taint analysis. A mere 2% of the 53 total outputs are properly escaped, indicating a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. The taint analysis reveals two flows with unsanitized paths, suggesting that data processed by the plugin might not be adequately validated or sanitized before being used in a way that could lead to security issues, even if a critical or high severity wasn't explicitly flagged in this initial analysis. The complete absence of nonce and capability checks, while potentially explained by the minimal attack surface, still represents a potential gap if functionality were ever exposed or if the analysis missed subtle entry points.
Given the lack of historical vulnerabilities, the plugin's security history is clean, which is a positive indicator. However, the current code analysis highlights concerning weaknesses, particularly in output sanitization and unsanitized data flows. While the attack surface is small, the identified code quality issues present a real risk to users. The plugin has strengths in its lack of historical issues and secure SQL usage but significant weaknesses in output handling and taint management.
Key Concerns
- Low percentage of properly escaped output
- Taint flows with unsanitized paths
- No nonce checks
- No capability checks
YD Spread Parameter Security Vulnerabilities
YD Spread Parameter Code Analysis
Output Escaping
Data Flow Analysis
YD Spread Parameter Attack Surface
WordPress Hooks 26
Maintenance & Trust
YD Spread Parameter Maintenance & Trust
Maintenance Signals
Community Trust
YD Spread Parameter Alternatives
YD *FAST* Page update
yd-fast-page-update
Speed-up page updating, when using custom permalinks and a lot of pages.
aapanel WP Toolkit
aapanel-wp-toolkit
A better way to manage dozens of WordPress websites.
Auto Copyright
auto-copyright-1
Automatically generates a copyright notice based on the first and last post published in the WordPress database.
Simple User Admin
simple-user-admin
Simple user admin is a WordPress MultiSite plugin that gives site administrators a simpler interface to manage blogs and users.
YD WordPress.com Stats Integration
yd-wordpresscom-stats-integration
Import your Wordpress.com statistics in your posts meta fields automatically
YD Spread Parameter Developer Profile
14 plugins · 180 total installs
How We Detect YD Spread Parameter
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.