ZPP Widget Security & Risk Analysis

wordpress.org/plugins/zpp-widget

Widget losujący okładki dla Złotego Programu Partnerskiego wydawnictwa Złote Myśli.

10 active installs v0.74 PHP + WP 3.0.0+ Updated Mar 18, 2016
ppprogram-partnerskizppzlote-mysli
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is ZPP Widget Safe to Use in 2026?

Generally Safe

Score 85/100

ZPP Widget has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "zpp-widget" plugin version 0.74 demonstrates a generally good security posture, particularly in its handling of SQL queries and lack of known vulnerabilities. The static analysis indicates a minimal attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the absence of critical or high severity taint flows suggests that user input is being handled cautiously. The plugin also appears to perform file operations and make external HTTP requests, which are common functionalities.

However, a significant concern arises from the complete lack of proper output escaping (0% properly escaped). This is a critical weakness, as it opens the door to Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is displayed by the plugin without proper sanitization could be exploited. The lack of nonce checks is also a point of concern, especially in conjunction with the lack of output escaping, as it could facilitate certain types of attacks if any sensitive actions were present. While the plugin has no recorded vulnerability history, the lack of output escaping presents a serious potential for future issues.

In conclusion, the "zpp-widget" plugin exhibits strengths in its limited attack surface and secure SQL practices. However, the critical deficiency in output escaping represents a substantial security risk that requires immediate attention. The absence of historical vulnerabilities is positive but does not mitigate the immediate threat posed by unescaped output.

Key Concerns

  • No output escaping found
  • No nonce checks found
Vulnerabilities
None known

ZPP Widget Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ZPP Widget Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
61
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
14
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped61 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
zppwidget_plugin_options (zpp-widget.php:550)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

ZPP Widget Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwidgets_initzpp-widget.php:33
actionwp_print_styleszpp-widget.php:34
actionadmin_menuzpp-widget.php:521
Maintenance & Trust

ZPP Widget Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 18, 2016
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ZPP Widget Developer Profile

Kalmang

2 plugins · 10K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
2394 days
View full developer profile
Detection Fingerprints

How We Detect ZPP Widget

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/zpp-widget/css/zpp-plugin.css

HTML / DOM Fingerprints

CSS Classes
zpp_widgetzpp_coverzpp_product_titlezpp_product_authorzpp_product_pricezpp_buy_now
Data Attributes
id="zpp-widget"
FAQ

Frequently Asked Questions about ZPP Widget