Anchor Links Plugin Security & Risk Analysis

wordpress.org/plugins/anchor-links

Auto add a summary in each article using his tags.

10 active installs v1.0 PHP + WP 2.0.2+ Updated Aug 20, 2010
anchorlinksseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Anchor Links Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

Anchor Links Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "anchor-links" v1.0 plugin presents a mixed security posture. The static analysis reveals a seemingly small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that are exposed or unprotected. This is a positive indicator, suggesting a lack of common entry points that attackers typically exploit. Furthermore, the absence of dangerous functions, file operations, and external HTTP requests in the code analysis is also reassuring.

However, significant concerns arise from the handling of data within the plugin. The single SQL query is not using prepared statements, which poses a risk of SQL injection if user-supplied data is not meticulously sanitized before being used in the query. Similarly, none of the identified output operations are properly escaped, indicating a strong possibility of cross-site scripting (XSS) vulnerabilities. The lack of nonce and capability checks on any potential (though not explicitly identified as present) entry points means that even if an entry point existed, it would likely be unprotected against unauthorized access or actions.

The vulnerability history is a strong point in favor of this plugin, showing zero known CVEs and no recorded common vulnerability types. This suggests a history of relatively secure development or effective patching by the developers. Despite the concerning findings in the static analysis regarding SQL queries and output escaping, the clean vulnerability history implies that these issues might not have been exploited in the past, or that the plugin's functionality is limited enough to minimize exposure. Nevertheless, the identified code weaknesses represent potential vulnerabilities that should be addressed to maintain a robust security posture.

Key Concerns

  • Raw SQL without prepared statements
  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Anchor Links Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Anchor Links Plugin Release Timeline

v1.1.1
v1.1
v1.0Current
vanchorlinks.php
vreadme.txt
vsommaire.gif
Code Analysis
Analyzed Mar 17, 2026

Anchor Links Plugin Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped1 total outputs
Attack Surface

Anchor Links Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentanchorlinks.php:65
filtersave_postanchorlinks.php:86
Maintenance & Trust

Anchor Links Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested3.1.4
Last updatedAug 20, 2010
PHP min version
Downloads10K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Anchor Links Plugin Developer Profile

oue.st

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Anchor Links Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
sommaire
Shortcode Output
<a name="</a><h2{$matches[2][$i]}</h2>
FAQ

Frequently Asked Questions about Anchor Links Plugin