Averroes Security & Risk Analysis

wordpress.org/plugins/averroes

A Gutenberg compatible markdown editor. Write in Markdown, edit in Markdown and preview in HTML.

10 active installs v1.1.1 PHP 5.2.4+ WP 4.9+ Updated Aug 9, 2018
averroeseditorgutenbergmarkdown
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Averroes Safe to Use in 2026?

Generally Safe

Score 85/100

Averroes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin 'averroes' v1.1.1 demonstrates an exceptionally strong security posture based on the provided static analysis and vulnerability history. The complete absence of identified entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code signals indicate robust security practices, with no dangerous functions, all SQL queries using prepared statements, and all output properly escaped. The lack of file operations, external HTTP requests, and the absence of non-checked or capability-checked functions further bolster its security. The taint analysis also shows no identified flows with unsanitized paths, indicating no apparent injection vulnerabilities.

The vulnerability history is equally impressive, with zero known CVEs recorded. This suggests a history of secure development and maintenance, or perhaps limited adoption and testing leading to undiscovered vulnerabilities. However, based solely on the provided data, there are no specific weaknesses to highlight, and the plugin appears to be exceptionally secure. The primary concern is the complete lack of any identified security mechanisms like nonce or capability checks, which, while not a problem in this specific analysis due to the zero attack surface, could become a critical weakness if any new entry points were introduced without these safeguards. Therefore, while the current state is excellent, future development should prioritize maintaining this secure approach and implementing appropriate checks if the attack surface expands.

Key Concerns

  • No Nonce Checks
  • No Capability Checks
Vulnerabilities
None known

Averroes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Averroes Release Timeline

v1.1.1Current
v1.1.0
v1.0.1
vv1.0.0
Code Analysis
Analyzed Mar 17, 2026

Averroes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Averroes Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Averroes Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedAug 9, 2018
PHP min version5.2.4
Downloads3K

Community Trust

Rating76/100
Number of ratings4
Active installs10
Developer Profile

Averroes Developer Profile

Riad Benguella

3 plugins · 140 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Averroes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/averroes/css/editor.css/wp-content/plugins/averroes/css/style.css/wp-content/plugins/averroes/js/editor.js/wp-content/plugins/averroes/js/i18n.js
Script Paths
/wp-content/plugins/averroes/js/editor.js/wp-content/plugins/averroes/js/i18n.js
Version Parameters
averroes/css/editor.css?ver=averroes/css/style.css?ver=averroes/js/editor.js?ver=averroes/js/i18n.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Averroes