
CodeHighlighter Security & Risk Analysis
wordpress.org/plugins/code-highlighterThis plugin is a syntax highlighter for source code using GeSHi.
Is CodeHighlighter Safe to Use in 2026?
Generally Safe
Score 85/100CodeHighlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'code-highlighter' plugin version 1.9 demonstrates a generally strong security posture with a notably absent attack surface and a complete absence of known vulnerabilities. The static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal footprint for potential attackers. Furthermore, all SQL queries are secured using prepared statements, and there are no external HTTP requests or bundled libraries that could introduce third-party risks. The plugin's vulnerability history also shows a clean slate, with zero recorded CVEs across all severity levels, suggesting a history of secure development or diligent patching by maintainers.
However, there are a few areas of concern that prevent a perfect score. The presence of a 'Dangerous functions: 1 (preg_replace(/e))' signal is a significant red flag, as this function can be exploited for remote code execution if not handled with extreme caution and input sanitization. While the taint analysis shows no critical or high severity flows, the '1 Flows with unsanitized paths' indicates a potential pathway for malicious input to be processed in an unsafe manner. Additionally, the low percentage of properly escaped output (25%) suggests a risk of cross-site scripting (XSS) vulnerabilities, particularly if the data processed by 'preg_replace(/e)' is user-supplied and then reflected in the output without adequate sanitization.
In conclusion, the 'code-highlighter' plugin has strengths in its limited attack surface and lack of known vulnerabilities. Nevertheless, the presence of a dangerous function with a potential unsanitized flow and a high rate of unescaped output necessitates careful review and potential remediation to mitigate risks of RCE and XSS. The lack of capability checks and nonce checks on the limited entry points (though currently zero) also leaves room for future vulnerabilities should new entry points be introduced without proper security controls.
Key Concerns
- Dangerous function (preg_replace(/e)) detected
- Flow with unsanitized path detected
- Low percentage of properly escaped output
- No nonce checks
- No capability checks
CodeHighlighter Security Vulnerabilities
CodeHighlighter Code Analysis
Dangerous Functions Found
Output Escaping
Data Flow Analysis
CodeHighlighter Attack Surface
WordPress Hooks 1
Maintenance & Trust
CodeHighlighter Maintenance & Trust
Maintenance Signals
Community Trust
CodeHighlighter Alternatives
Advanced Excerpt
advanced-excerpt
Control the appearance of WordPress post excerpts
HTML Editor Syntax Highlighter
html-editor-syntax-highlighter
Add syntax highlighting to WordPress code editors using CodeMirror.js
Raw HTML
raw-html
Lets you use raw HTML or any other code in your posts. You can also disable smart quotes and other automatic formatting on a per-post basis.
Toggle wpautop
toggle-wpautop
Easily disable the default wpautop filter on a post by post basis.
Urvanov Syntax Highlighter
urvanov-syntax-highlighter
Reincarnation of Crayon Syntax Highlighter. Syntax Highlighter supporting multiple languages, themes, fonts, highlighting from a URL, or post text.
CodeHighlighter Developer Profile
3 plugins · 40 total installs
How We Detect CodeHighlighter
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/code-highlighter/geshi.phpHTML / DOM Fingerprints
<pre<code