Add Script To Post Security & Risk Analysis

wordpress.org/plugins/add-script-to-post

Add custom script to a post by shortcode in post's content.

20 active installs v1.0 PHP + WP 3.0+ Updated Unknown
postshortcodestyle
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Add Script To Post Safe to Use in 2026?

Generally Safe

Score 100/100

Add Script To Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The add-script-to-post plugin version 1.0 exhibits a mixed security posture. On the positive side, there are no known vulnerabilities (CVEs) recorded, and the plugin does not utilize dangerous functions, perform file operations, or make external HTTP requests. All SQL queries are also handled with prepared statements. However, significant concerns arise from the lack of output escaping, with 100% of identified outputs not being properly escaped. This presents a substantial risk for cross-site scripting (XSS) vulnerabilities.

The static analysis reveals a single entry point via a shortcode, which, critically, has no capability checks or nonce verification. While the total attack surface is small and there are no AJAX or REST API endpoints without authentication, the unprotected shortcode is a major concern. The absence of taint analysis data (0 flows analyzed) and the lack of capability checks on the shortcode mean that any data processed or displayed by this shortcode could potentially be manipulated by unauthenticated users.

Given the clean vulnerability history, it's possible that the plugin hasn't been widely targeted or that the limited functionality hasn't exposed critical flaws yet. Nevertheless, the identified weaknesses, particularly unescaped output and the unprotected shortcode, create exploitable pathways. A strong conclusion is that while the plugin has a small attack surface and avoids some common pitfalls, the lack of output escaping and inadequate protection on its sole user-facing entry point (the shortcode) make it a moderate to high risk for XSS and potential content manipulation.

Key Concerns

  • Unescaped output detected
  • Shortcode without capability checks
  • Shortcode without nonce checks
Vulnerabilities
None known

Add Script To Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Add Script To Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Add Script To Post Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[script] add-script-to-post.php:66
WordPress Hooks 2
actionplugins_loadedadd-script-to-post.php:42
actionwp_headadd-script-to-post.php:60
Maintenance & Trust

Add Script To Post Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Add Script To Post Developer Profile

Arefly

24 plugins · 2K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Add Script To Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[script]
FAQ

Frequently Asked Questions about Add Script To Post