Auto Anchor List Security & Risk Analysis

wordpress.org/plugins/auto-anchor-links

Creates anchor links to heading tags in the content and displays automatically at the top of the content, or allows for custom placement with tags.

50 active installs v1.0 PHP + WP + Updated Unknown
anchor-linkscontentcontent-linkslinkssidebar
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Auto Anchor List Safe to Use in 2026?

Generally Safe

Score 100/100

Auto Anchor List has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "auto-anchor-links" plugin v1.0 currently exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface entry points, dangerous functions, raw SQL queries, or external HTTP requests is highly positive. Furthermore, the plugin has no recorded vulnerability history, suggesting a history of secure development or limited exposure. However, a significant concern is the complete lack of output escaping. This means that any data processed or displayed by the plugin, even if it originates from a trusted source, is not being sanitized before being rendered in the browser. This could lead to Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is somehow incorporated into the output, despite the current analysis not explicitly showing such flows.

While the current analysis shows no taint flows, this is largely due to the absence of identified entry points and code signals that would typically be analyzed by taint analysis tools. The complete absence of nonce and capability checks, coupled with zero output escaping, means that if any entry points were ever introduced, or if the plugin interacted with user-supplied data in unexpected ways, severe security vulnerabilities like Cross-Site Request Forgery (CSRF) and XSS could be easily exploited. The plugin's strengths lie in its apparent minimalism and lack of complex, potentially vulnerable functionalities. However, the complete lack of output escaping represents a critical oversight that needs immediate attention.

Key Concerns

  • No output escaping implemented
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Auto Anchor List Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Auto Anchor List Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped7 total outputs
Attack Surface

Auto Anchor List Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuadmin\admin.php:14
actionwp_print_stylesmwm-aal-class.php:24
filterthe_contentmwm-aal-class.php:25
filterthe_excerptmwm-aal-class.php:26
Maintenance & Trust

Auto Anchor List Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads5K

Community Trust

Rating90/100
Number of ratings2
Active installs50
Developer Profile

Auto Anchor List Developer Profile

mindwiremedia

1 plugin · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Auto Anchor List

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/auto-anchor-list/css/mwm-aal.css
Version Parameters
mwm-aal.css?ver=1.0.0

HTML / DOM Fingerprints

CSS Classes
mwm-aal-containermwm-aal-titlemwm-aal-sidebar-container
HTML Comments
<!--mwm_aal_display-->
JS Globals
mwm_aalLoadermwm_aal
Shortcode Output
<div class="mwm-aal-container"><div class='mwm-aal-title'><ol>
FAQ

Frequently Asked Questions about Auto Anchor List