Commenters can add tags Security & Risk Analysis

wordpress.org/plugins/commenters-can-add-tags

Commenters can add tags allows commenters to add tags to a post just by adding a prefixed word in a comment. Prefix is # by default.

10 active installs v0.2 PHP + WP 4.3.1+ Updated Aug 25, 2016
commentsetiquetasetiquettestagtags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Commenters can add tags Safe to Use in 2026?

Generally Safe

Score 85/100

Commenters can add tags has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The 'commenters-can-add-tags' plugin, version 0.2, presents a generally strong security posture with no reported vulnerabilities and a limited attack surface. The static analysis indicates no AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential entry points for attackers. Furthermore, all SQL queries are confirmed to be using prepared statements, a critical practice for preventing SQL injection. The absence of dangerous functions and file operations also contributes to a positive security outlook.

However, a significant concern arises from the output escaping analysis. With 0% of the identified outputs properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data displayed to users without proper sanitization could be exploited by attackers to inject malicious scripts. The presence of a single capability check without any nonce checks for the identified flows is also a weakness, though the overall lack of entry points mitigates this risk to some extent. The plugin's history of zero known CVEs is a strong positive indicator, suggesting consistent security development or a low profile that has not attracted widespread vulnerability discovery.

In conclusion, while the plugin benefits from a minimal attack surface and secure database practices, the lack of output escaping is a critical flaw that needs immediate attention. This oversight could lead to severe security issues, outweighing the benefits of its otherwise robust design. Addressing the XSS risk is paramount to improving its overall security. The vulnerability history is reassuring but does not negate the immediate risks identified in the code analysis.

Key Concerns

  • Unescaped output identified
  • Missing nonce checks on identified flows
Vulnerabilities
None known

Commenters can add tags Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Commenters can add tags Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
antonat_admin_options (commenters-can-add-tags.php:143)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Commenters can add tags Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedcommenters-can-add-tags.php:46
actioncomment_postcommenters-can-add-tags.php:108
actionadmin_menucommenters-can-add-tags.php:132
Maintenance & Trust

Commenters can add tags Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedAug 25, 2016
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Commenters can add tags Developer Profile

Raulanton

3 plugins · 30 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Commenters can add tags

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Commenters can add tags