Clariti Security & Risk Analysis

wordpress.org/plugins/clariti

Seamlessly sync your content with Clariti.

1K active installs v1.2.2 PHP 7.4+ WP 6.0+ Updated Jan 15, 2026
bloggingsite-optimization
99
A · Safe
CVEs total1
Unpatched0
Last CVESep 22, 2025
Download
Safety Verdict

Is Clariti Safe to Use in 2026?

Generally Safe

Score 99/100

Clariti has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Sep 22, 2025Updated 2mo ago
Risk Assessment

The "clariti" v1.2.2 plugin demonstrates strong adherence to many security best practices. The static analysis reveals a well-secured attack surface with no unprotected AJAX handlers or REST API routes. Furthermore, all SQL queries are prepared, output is consistently escaped, and file operations are absent, which significantly reduces the risk of common web vulnerabilities. The presence of nonce and capability checks further solidifies its defensive measures.

However, a notable concern arises from the plugin's vulnerability history. Despite having no currently unpatched CVEs, the past existence of a medium-severity vulnerability, specifically related to Missing Authorization, is a significant red flag. This history suggests a potential recurring weakness in how user permissions and access are managed within the plugin. The single external HTTP request, while not inherently insecure, warrants careful monitoring as it can sometimes be a vector for supply chain attacks if the external service is compromised.

In conclusion, "clariti" v1.2.2 exhibits excellent secure coding practices in its current version, particularly in preventing direct code execution and data manipulation vulnerabilities. The plugin's strengths lie in its robust handling of common WordPress security entry points. The primary weakness, inferred from its past, is the potential for authorization-related flaws, which requires ongoing vigilance and a thorough review of its authorization logic, even if no current vulnerabilities are listed.

Key Concerns

  • Past medium severity vulnerability (Missing Authorization)
  • One external HTTP request
Vulnerabilities
1

Clariti Security Vulnerabilities

CVEs by Year

1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-57991medium · 5.4Missing Authorization

Clariti <= 1.2.1 - Missing Authorization

Sep 22, 2025 Patched in 1.2.2 (11d)
Code Analysis
Analyzed Mar 16, 2026

Clariti Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
13 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped13 total outputs
Attack Surface

Clariti Attack Surface

Entry Points1
Unprotected0

REST API Routes 1

GET/wp-json/clariti/v1/verifyinc\class-rest-api.php:20
WordPress Hooks 17
actionadmin_menuclariti.php:21
filterrest_indexclariti.php:23
actionrest_api_initclariti.php:24
actionadmin_post_clear_secretclariti.php:28
actionadded_optionclariti.php:29
actionupdated_optionclariti.php:30
actiontransition_post_statusclariti.php:31
actionwp_trash_postclariti.php:32
actionbefore_delete_postclariti.php:33
actioncreated_termclariti.php:34
actionedited_termclariti.php:35
actiondelete_termclariti.php:36
actionwp_insert_commentclariti.php:37
actiontransition_comment_statusclariti.php:38
actionupdated_postmetaclariti.php:39
actiontbf_after_post_operation_executionclariti.php:44
actiontasty_recipes_updated_recipe_ratinginc\class-notifier.php:335
Maintenance & Trust

Clariti Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 15, 2026
PHP min version7.4
Downloads34K

Community Trust

Rating0/100
Number of ratings0
Active installs1K
Developer Profile

Clariti Developer Profile

Clariti

1 plugin · 1K total installs

93
trust score
Avg Security Score
99/100
Avg Patch Time
11 days
View full developer profile
Detection Fingerprints

How We Detect Clariti

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

REST Endpoints
/clariti/v1/verify
FAQ

Frequently Asked Questions about Clariti