
Better WordPress Syntax Highlighter Security & Risk Analysis
wordpress.org/plugins/better-wordpress-syntax-based-on-geshiThis plugin allows you to highlight code syntax in your posts. There are plenty of options to choose.
Is Better WordPress Syntax Highlighter Safe to Use in 2026?
Generally Safe
Score 85/100Better WordPress Syntax Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "better-wordpress-syntax-based-on-geshi" plugin v1.0.6 presents a mixed security picture. On the positive side, it boasts a zero attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events, with no known CVEs in its history. SQL queries are exclusively handled via prepared statements, and there are a good number of capability checks and nonce checks in place, indicating an effort to secure certain operations. However, concerns arise from the static analysis. The presence of the `create_function` dangerous function is a significant red flag, as it can be used for arbitrary code execution if not handled with extreme care and sanitization, though the taint analysis did not reveal any critical or high severity flows originating from it.
Furthermore, the output escaping is notably weak, with only 24% of outputs being properly escaped. This leaves the plugin vulnerable to Cross-Site Scripting (XSS) attacks, where malicious scripts could be injected and executed in the user's browser. The taint analysis, while not flagging critical issues, did identify two flows with unsanitized paths, which could potentially be leveraged in more complex attack scenarios. The plugin's vulnerability history is clean, which is a strength, but the static analysis findings suggest potential latent weaknesses that could be exploited if not addressed. The overall security posture is therefore moderately concerning due to the dangerous function and poor output escaping, despite a clean vulnerability record and a limited attack surface.
Key Concerns
- Dangerous function found (create_function)
- Low percentage of properly escaped output
- Flows with unsanitized paths found
Better WordPress Syntax Highlighter Security Vulnerabilities
Better WordPress Syntax Highlighter Release Timeline
Better WordPress Syntax Highlighter Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
Better WordPress Syntax Highlighter Attack Surface
WordPress Hooks 24
Maintenance & Trust
Better WordPress Syntax Highlighter Maintenance & Trust
Maintenance Signals
Community Trust
Better WordPress Syntax Highlighter Alternatives
Youbou Code Block
youbou-code-block
Code block with syntax highlighting for gutenberg editor.
SyntaxHighlighter Evolved
syntaxhighlighter
Easily post syntax-highlighted code to your site without having to modify the code at all. As seen on WordPress.com.
Enlighter – Customizable Syntax Highlighter
enlighter
All-in-one Syntax Highlighting solution. Full Gutenberg and Classic Editor integration. Graphical theme customizer. Based on EnlighterJS.
Syntax-highlighting Code Block (with Server-side Rendering)
syntax-highlighting-code-block
Extending the Code block with syntax highlighting rendered on the server, thus being AMP-compatible and having faster frontend performance.
Code Block Syntax Highlighter for Elementor
code-block-for-elementor
This is an drag & drop widget for syntax highlighting of code blocks.
Better WordPress Syntax Highlighter Developer Profile
5 plugins · 9K total installs
How We Detect Better WordPress Syntax Highlighter
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/better-wordpress-syntax-based-on-geshi/css/bwp-syntax.css/wp-content/plugins/better-wordpress-syntax-based-on-geshi/js/bwp-syntax.js/wp-content/plugins/better-wordpress-syntax-based-on-geshi/js/bwp-syntax.jsbetter-wordpress-syntax-based-on-geshi/css/bwp-syntax.css?ver=better-wordpress-syntax-based-on-geshi/js/bwp-syntax.js?ver=HTML / DOM Fingerprints
bwp-syntax-highlighterdata-bwp-syntax-lang[bws_code][/bws_code]