Better WordPress Syntax Highlighter Security & Risk Analysis

wordpress.org/plugins/better-wordpress-syntax-based-on-geshi

This plugin allows you to highlight code syntax in your posts. There are plenty of options to choose.

70 active installs v1.0.6 PHP + WP 2.8+ Updated Oct 27, 2013
code-highlightinggeshihighlightingsyntax-highlighting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Better WordPress Syntax Highlighter Safe to Use in 2026?

Generally Safe

Score 85/100

Better WordPress Syntax Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "better-wordpress-syntax-based-on-geshi" plugin v1.0.6 presents a mixed security picture. On the positive side, it boasts a zero attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events, with no known CVEs in its history. SQL queries are exclusively handled via prepared statements, and there are a good number of capability checks and nonce checks in place, indicating an effort to secure certain operations. However, concerns arise from the static analysis. The presence of the `create_function` dangerous function is a significant red flag, as it can be used for arbitrary code execution if not handled with extreme care and sanitization, though the taint analysis did not reveal any critical or high severity flows originating from it.

Furthermore, the output escaping is notably weak, with only 24% of outputs being properly escaped. This leaves the plugin vulnerable to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed in the user's browser. The taint analysis, while not flagging critical issues, did identify two flows with unsanitized paths, which could potentially be leveraged in more complex attack scenarios. The plugin's vulnerability history is clean, which is a strength, but the static analysis findings suggest potential latent weaknesses that could be exploited if not addressed. The overall security posture is therefore moderately concerning due to the dangerous function and poor output escaping, despite a clean vulnerability record and a limited attack surface.

Key Concerns

  • Dangerous function found (create_function)
  • Low percentage of properly escaped output
  • Flows with unsanitized paths found
Vulnerabilities
None known

Better WordPress Syntax Highlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Better WordPress Syntax Highlighter Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Better WordPress Syntax Highlighter Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
22
7 escaped
Nonce Checks
2
Capability Checks
4
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$callback_2 = create_function('$matches', 'return "[" . str_replace("|", "", $matches[1]) . "]";');includes/geshi/geshi.php:4736

Output Escaping

24% escaped29 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
build_option_pages (includes/class-bwp-syntax.php:182)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Better WordPress Syntax Highlighter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 24
actionadmin_menubwp-syntax.php:15
actionadmin_menubwp-syntax.php:16
actioninitbwp-syntax.php:18
actiontemplate_redirectbwp-syntax.php:19
filterthe_contentbwp-syntax.php:47
actionadmin_noticesincludes/class-bwp-framework.php:168
actionnetwork_admin_noticesincludes/class-bwp-framework.php:169
actioninitincludes/class-bwp-framework.php:274
filterbwp-admin-form-iconincludes/class-bwp-framework.php:285
filterbwp-admin-plugin-versionincludes/class-bwp-framework.php:286
actionbwp_option_action_before_formincludes/class-bwp-framework.php:287
filterplugin_action_linksincludes/class-bwp-framework.php:405
actionbwp_option_action_before_formincludes/class-bwp-framework.php:455
filterthe_contentincludes/class-bwp-syntax.php:123
filtercomment_textincludes/class-bwp-syntax.php:124
filterthe_contentincludes/class-bwp-syntax.php:127
filterthe_contentincludes/class-bwp-syntax.php:129
filterthe_contentincludes/class-bwp-syntax.php:134
filtercomment_textincludes/class-bwp-syntax.php:136
filterthe_contentincludes/class-bwp-syntax.php:141
filtercomment_textincludes/class-bwp-syntax.php:143
filtermce_external_pluginsincludes/class-bwp-syntax.php:457
filtermce_buttonsincludes/class-bwp-syntax.php:458
filtertiny_mce_before_initincludes/class-bwp-syntax.php:459
Maintenance & Trust

Better WordPress Syntax Highlighter Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedOct 27, 2013
PHP min version
Downloads10K

Community Trust

Rating100/100
Number of ratings1
Active installs70
Developer Profile

Better WordPress Syntax Highlighter Developer Profile

Khang Minh

5 plugins · 9K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Better WordPress Syntax Highlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/better-wordpress-syntax-based-on-geshi/css/bwp-syntax.css/wp-content/plugins/better-wordpress-syntax-based-on-geshi/js/bwp-syntax.js
Script Paths
/wp-content/plugins/better-wordpress-syntax-based-on-geshi/js/bwp-syntax.js
Version Parameters
better-wordpress-syntax-based-on-geshi/css/bwp-syntax.css?ver=better-wordpress-syntax-based-on-geshi/js/bwp-syntax.js?ver=

HTML / DOM Fingerprints

CSS Classes
bwp-syntax-highlighter
Data Attributes
data-bwp-syntax-lang
Shortcode Output
[bws_code][/bws_code]
FAQ

Frequently Asked Questions about Better WordPress Syntax Highlighter