YM Contact Display Security & Risk Analysis

wordpress.org/plugins/ym-contact-display

This plugin can be used to show your information such as Company Name, Address, Phone, Fax, Email.

30 active installs v1.0 PHP + WP 3.0.1+ Updated Oct 9, 2014
addressaddress-displaycontactcontact-addresscontact-display
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is YM Contact Display Safe to Use in 2026?

Generally Safe

Score 85/100

YM Contact Display has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "ym-contact-display" plugin v1.0 exhibits a generally positive security posture, with no known CVEs and no reported vulnerabilities. The static analysis shows a lack of attack surface through traditional entry points like AJAX handlers, REST API routes, and shortcodes. Furthermore, all SQL queries are properly prepared, and there are no file operations or external HTTP requests, which are common vectors for exploitation. However, the presence of the `create_function` call is a significant concern as it is deprecated and can lead to security vulnerabilities if used improperly, especially with user-supplied input. While taint analysis shows no immediate issues, the `create_function` function itself represents a potential risk that hasn't been fully mitigated through proper sanitization or avoidance.

The plugin's output escaping is only at 48%, indicating a substantial number of potential cross-site scripting (XSS) vulnerabilities. This weakness, coupled with the `create_function` issue, presents a notable risk. The lack of nonce checks and capability checks on any potential (though currently unexposed) entry points is also a concern, as it leaves any future additions to the attack surface unprotected. The absence of vulnerability history is a positive sign but doesn't negate the risks identified in the code analysis. In conclusion, while the plugin has a clean history and a small attack surface, the identified code quality issues related to `create_function` and insufficient output escaping warrant attention to prevent potential security breaches.

Key Concerns

  • Use of create_function
  • Insufficient output escaping (48%)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

YM Contact Display Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

YM Contact Display Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
22
20 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functioncreate_function('', 'return register_widget("ym_contact_display");')ym-contact-display.php:142

Output Escaping

48% escaped42 total outputs
Attack Surface

YM Contact Display Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwidgets_initym-contact-display.php:141
Maintenance & Trust

YM Contact Display Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedOct 9, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs30
Developer Profile

YM Contact Display Developer Profile

youngminds

2 plugins · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect YM Contact Display

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
ym-contact-displayaddresspad-bot1pad-bot72
Shortcode Output
<div class="ym-contact-display"><p class="address pad-bot1"><p class="address pad-bot72">
FAQ

Frequently Asked Questions about YM Contact Display