Crayon Syntax Highlighter to Pastacode Security & Risk Analysis

wordpress.org/plugins/crayon-syntax-highlighter-to-pastacode

The only use of this plugin is to convert Crayon Syntax Highlighter's tags into Pastacode shortcodes.

40 active installs v1.0 PHP + WP 3.1+ Updated Aug 31, 2016
crayonhighlightermigrationpastacodesyntax
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Crayon Syntax Highlighter to Pastacode Safe to Use in 2026?

Generally Safe

Score 85/100

Crayon Syntax Highlighter to Pastacode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin 'crayon-syntax-highlighter-to-pastacode' version 1.0 demonstrates a mixed security posture. On the positive side, the code analysis reveals a clean record with no dangerous functions, no file operations, and no external HTTP requests. Furthermore, all SQL queries are properly prepared, and there are no known vulnerabilities (CVEs) associated with this plugin. The presence of nonce and capability checks suggests an awareness of security best practices in some areas.

However, a significant concern arises from the presence of one unprotected AJAX handler. This represents a direct entry point into the plugin's functionality that could be exploited if it lacks proper authorization or input validation. While the taint analysis shows no unsanitized paths, the unprotected AJAX handler itself is a critical weakness that could potentially lead to various attacks, depending on its implementation. The partial proper escaping of output also presents a minor, but present, risk.

Overall, the plugin benefits from a lack of known vulnerabilities and good practices in SQL handling. However, the single unprotected AJAX handler is a substantial security gap that requires immediate attention. Addressing this specific entry point would significantly improve the plugin's security posture.

Key Concerns

  • Unprotected AJAX handler found
  • Half of output not properly escaped
Vulnerabilities
None known

Crayon Syntax Highlighter to Pastacode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Crayon Syntax Highlighter to Pastacode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
5 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped10 total outputs
Attack Surface
1 unprotected

Crayon Syntax Highlighter to Pastacode Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_c2p-process-migrationcrayon-to-pastacode.php:65
WordPress Hooks 5
actionplugins_loadedcrayon-to-pastacode.php:19
actionadmin_menucrayon-to-pastacode.php:27
actionadmin_enqueue_scriptscrayon-to-pastacode.php:60
actionadmin_post_c2p-delete-logscrayon-to-pastacode.php:92
actionadmin_post_restore-c2p-migrationcrayon-to-pastacode.php:103
Maintenance & Trust

Crayon Syntax Highlighter to Pastacode Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedAug 31, 2016
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs40
Developer Profile

Crayon Syntax Highlighter to Pastacode Developer Profile

Willy Bahuaud

8 plugins · 9K total installs

86
trust score
Avg Security Score
89/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Crayon Syntax Highlighter to Pastacode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/crayon-syntax-highlighter-to-pastacode/script.js
Script Paths
script.js
Version Parameters
wabeo-c2p-migration

HTML / DOM Fingerprints

CSS Classes
c2p-migrationc2p-content-infosc2p-erase-log
Data Attributes
id="c2p-migration"id="c2p-content-infos"id="c2p-erase-log"
JS Globals
c2p_nonce
Shortcode Output
[pastacode
FAQ

Frequently Asked Questions about Crayon Syntax Highlighter to Pastacode