CodeHighlighter Security & Risk Analysis

wordpress.org/plugins/code-highlighter

This plugin is a syntax highlighter for source code using GeSHi.

10 active installs v1.9 PHP + WP 2.0+ Updated Jun 18, 2012
code-highlighterformattingpostsyntax-highlight
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CodeHighlighter Safe to Use in 2026?

Generally Safe

Score 85/100

CodeHighlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'code-highlighter' plugin version 1.9 demonstrates a generally strong security posture with a notably absent attack surface and a complete absence of known vulnerabilities. The static analysis reveals no AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal footprint for potential attackers. Furthermore, all SQL queries are secured using prepared statements, and there are no external HTTP requests or bundled libraries that could introduce third-party risks. The plugin's vulnerability history also shows a clean slate, with zero recorded CVEs across all severity levels, suggesting a history of secure development or diligent patching by maintainers.

However, there are a few areas of concern that prevent a perfect score. The presence of a 'Dangerous functions: 1 (preg_replace(/e))' signal is a significant red flag, as this function can be exploited for remote code execution if not handled with extreme caution and input sanitization. While the taint analysis shows no critical or high severity flows, the '1 Flows with unsanitized paths' indicates a potential pathway for malicious input to be processed in an unsafe manner. Additionally, the low percentage of properly escaped output (25%) suggests a risk of cross-site scripting (XSS) vulnerabilities, particularly if the data processed by 'preg_replace(/e)' is user-supplied and then reflected in the output without adequate sanitization.

In conclusion, the 'code-highlighter' plugin has strengths in its limited attack surface and lack of known vulnerabilities. Nevertheless, the presence of a dangerous function with a potential unsanitized flow and a high rate of unescaped output necessitates careful review and potential remediation to mitigate risks of RCE and XSS. The lack of capability checks and nonce checks on the limited entry points (though currently zero) also leaves room for future vulnerabilities should new entry points be introduced without proper security controls.

Key Concerns

  • Dangerous function (preg_replace(/e)) detected
  • Flow with unsanitized path detected
  • Low percentage of properly escaped output
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

CodeHighlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CodeHighlighter Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
18
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

preg_replace(/e)preg_replace( "/([^a-zA-Z0-9\$_\|\#;>|^])($kgeshi.php:2134

Output Escaping

25% escaped24 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<aliased> (contrib\aliased.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

CodeHighlighter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentcodehighlighter.php:75
Maintenance & Trust

CodeHighlighter Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedJun 18, 2012
PHP min version
Downloads12K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CodeHighlighter Developer Profile

iwongu

3 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect CodeHighlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/code-highlighter/geshi.php

HTML / DOM Fingerprints

Shortcode Output
<pre<code
FAQ

Frequently Asked Questions about CodeHighlighter