Cipher Security & Risk Analysis

wordpress.org/plugins/cipher

Cipher allows commenters to publish (pre-formatted) code.

10 active installs v1.2.2 PHP 5.6.20+ WP 5.2+ Updated Unknown
backtickscodecommentpreformattedsnippet
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Cipher Safe to Use in 2026?

Generally Safe

Score 100/100

Cipher has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'cipher' plugin v1.2.2 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface, and importantly, all identified SQL queries utilize prepared statements. The plugin also shows no file operations or external HTTP requests, further reducing potential vulnerabilities. The complete lack of known CVEs and vulnerability history is a positive indicator of its security development practices. However, a critical concern arises from the output escaping analysis, where 100% of outputs are not properly escaped. This presents a significant risk of cross-site scripting (XSS) vulnerabilities if user-supplied data is ever displayed without sanitization, as this data could be leveraged by attackers to inject malicious scripts. The lack of capability checks and nonce checks, while seemingly mitigated by the small attack surface, leaves the plugin open to potential privilege escalation or CSRF attacks if new entry points are introduced in future versions without proper security controls. The absence of taint analysis results could be due to the limited entry points or the plugin's functionality, but it's worth noting that sophisticated vulnerabilities can sometimes evade basic static analysis.

Key Concerns

  • Unescaped output identified
  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Cipher Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Cipher Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Cipher Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterpreprocess_commentcore\cipher.class.php:33
actionadmin_noticeslibrary\plugin.class.php:226
Maintenance & Trust

Cipher Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedUnknown
PHP min version5.6.20
Downloads4K

Community Trust

Rating80/100
Number of ratings2
Active installs10
Developer Profile

Cipher Developer Profile

LuigivdB

4 plugins · 50 total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Cipher

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/cipher/core/cipher.js
Version Parameters
cipher/core/cipher.js?ver=1.2.2

HTML / DOM Fingerprints

CSS Classes
cipher-code
Shortcode Output
[cipher]
FAQ

Frequently Asked Questions about Cipher