Accessibility Language Security & Risk Analysis

wordpress.org/plugins/accessibility-language

Add language-tags via TinyMCE to comply with the Web Content Accessibility Guidelines.

10 active installs v1.0.0 PHP + WP 3.0+ Updated Jul 7, 2011
accessibilitylanglanguagewcag
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Accessibility Language Safe to Use in 2026?

Generally Safe

Score 85/100

Accessibility Language has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'accessibility-language' plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code analysis indicates a lack of dangerous functions, and all SQL queries are properly prepared, with all output being correctly escaped. The plugin also avoids file operations and external HTTP requests, further reducing potential vulnerabilities.

The most notable strength is the complete absence of any identified security flaws in the static analysis, including taint flows. This suggests the developers have followed secure coding practices. The vulnerability history is also clean, with no recorded CVEs, indicating a history of secure development or a lack of prior discovery of vulnerabilities.

However, it's important to note that the analysis found no nonce checks and only two capability checks. While there are no current apparent vulnerabilities, a lack of robust authentication and authorization mechanisms on potential future entry points (should they be introduced) could become a concern. The plugin's strengths lie in its current minimal attack surface and clean code, but a proactive approach to adding more comprehensive security checks, especially if the plugin evolves, would be prudent.

Vulnerabilities
None known

Accessibility Language Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Accessibility Language Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Accessibility Language Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Accessibility Language Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filtermce_cssaccessibility-language.php:20
filtermce_external_languagesaccessibility-language.php:27
filtermce_external_pluginsaccessibility-language.php:35
filtermce_buttonsaccessibility-language.php:36
actionadmin_initaccessibility-language.php:55
Maintenance & Trust

Accessibility Language Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedJul 7, 2011
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Accessibility Language Developer Profile

Hailstorm

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Accessibility Language

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/accessibility-language/css/accessibility-language.css
Script Paths
/wp-content/plugins/accessibility-language/language/editor_plugin.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Accessibility Language