WP Calais Auto Tagger Security & Risk Analysis

wordpress.org/plugins/calais-auto-tagger

The plugin performs semantic analysis of your posts to suggest tags using Open Calais.

40 active installs v2.0 PHP + WP 2.7+ Updated Jun 10, 2015
semanticsuggesttaggertaggingtags
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 9, 2025
Safety Verdict

Is WP Calais Auto Tagger Safe to Use in 2026?

Use With Caution

Score 63/100

WP Calais Auto Tagger has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 9, 2025Updated 10yr ago
Risk Assessment

The calais-auto-tagger plugin v2.0 presents a significant security risk due to several critical vulnerabilities identified in the static analysis. The presence of an unprotected AJAX handler is a major concern, as it represents a direct entry point into the plugin's functionality without any authentication or authorization checks. This could be exploited by attackers to perform unauthorized actions. Compounding this, the code analysis indicates a complete lack of output escaping, meaning any data processed or displayed by the plugin could be vulnerable to cross-site scripting (XSS) attacks. While the plugin shows good practices in using prepared statements for SQL queries and avoids file operations, these strengths are overshadowed by the critical weaknesses in its attack surface and output handling. The vulnerability history, including a known unpatched medium-severity CVE related to CSRF, further highlights a pattern of security negligence. This suggests that the plugin has a history of introducing exploitable flaws, and the current version has not addressed all past issues. Overall, the plugin's security posture is poor, with immediate action required to mitigate the identified risks.

Key Concerns

  • Unprotected AJAX handler
  • No output escaping
  • Missing nonce checks on AJAX
  • Missing capability checks
  • Unpatched CVE (medium severity)
Vulnerabilities
1

WP Calais Auto Tagger Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-32563medium · 6.1Cross-Site Request Forgery (CSRF)

WP Calais Auto Tagger <= 2.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Apr 9, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

WP Calais Auto Tagger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
calais_conf (calais_auto_tagger.php:109)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

WP Calais Auto Tagger Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_calais_gettagscalais_auto_tagger.php:22
WordPress Hooks 2
actionadmin_menucalais_auto_tagger.php:20
actionsave_postcalais_auto_tagger.php:21
Maintenance & Trust

WP Calais Auto Tagger Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedJun 10, 2015
PHP min version
Downloads31K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

WP Calais Auto Tagger Developer Profile

dangrossman

3 plugins · 70 total installs

79
trust score
Avg Security Score
78/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Calais Auto Tagger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/calais-auto-tagger/calais.css/wp-content/plugins/calais-auto-tagger/calais.js
Script Paths
/wp-content/plugins/calais-auto-tagger/calais.js

HTML / DOM Fingerprints

Data Attributes
id="calais_taglist"
JS Globals
calais_gettags
REST Endpoints
/wp-json/calais_gettags
FAQ

Frequently Asked Questions about WP Calais Auto Tagger