Code Markup Security & Risk Analysis

wordpress.org/plugins/code-markup

Code Markup is a WordPress plugin that makes it easy to include program code samples in your posts.

200 active installs v1.3 PHP + WP 1.5+ Updated Apr 14, 2008
codeformathtml-xmljavamarkup
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Code Markup Safe to Use in 2026?

Generally Safe

Score 85/100

Code Markup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The plugin 'code-markup' v1.3 demonstrates an exceptionally strong security posture based on the provided static analysis results. The absence of any identified attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly reduces the potential for external exploitation. Furthermore, the code shows adherence to secure coding practices, with no dangerous functions, all SQL queries utilizing prepared statements, and all outputs being properly escaped. The lack of file operations and external HTTP requests further minimizes risk. The plugin also has no recorded vulnerability history, which is a positive indicator of its past security performance.

However, the complete absence of nonce checks and capability checks across all potential entry points (though zero are identified) represents a theoretical concern. While the current attack surface is zero, any future additions or unforeseen interactions could potentially be exposed if these fundamental security mechanisms are not implemented by default. The lack of any identified taint flows is also noteworthy, suggesting that the code is either very simple or very robust against common injection vulnerabilities.

In conclusion, 'code-markup' v1.3 appears to be a highly secure plugin. Its strengths lie in its minimal attack surface and strict adherence to secure coding practices for the features it does implement. The primary, albeit theoretical, weakness is the lack of any demonstrated security checks like nonces or capabilities, which could become relevant if the plugin's functionality expands. Given the current data, the risk associated with this plugin is very low.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Code Markup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Code Markup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Code Markup Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentcode-markup.php:41
filterthe_contentcode-markup.php:43
Maintenance & Trust

Code Markup Maintenance & Trust

Maintenance Signals

WordPress version tested2.5
Last updatedApr 14, 2008
PHP min version
Downloads21K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Developer Profile

Code Markup Developer Profile

bennettmcelwee

6 plugins · 22K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
1413 days
View full developer profile
Detection Fingerprints

How We Detect Code Markup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
code-markup
Shortcode Output
<code
FAQ

Frequently Asked Questions about Code Markup