Creative Commons Tagger Security & Risk Analysis

wordpress.org/plugins/creative-commons-tagger

Adds support for tagging images with creative commons licenses.

10 active installs v0.6 PHP + WP 3.0.1+ Updated Dec 30, 2013
cccreative-commonsimageslicense
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Creative Commons Tagger Safe to Use in 2026?

Generally Safe

Score 85/100

Creative Commons Tagger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The 'creative-commons-tagger' plugin v0.6 exhibits a generally strong security posture based on the static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the plugin's attack surface. Furthermore, the code signals indicate a complete absence of dangerous functions and external HTTP requests, and all SQL queries are properly prepared. The plugin also demonstrates an effort towards security by including a capability check, which is a positive sign.

However, there are some areas for improvement. The output escaping is only properly implemented in 38% of the identified outputs, which could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed to users. The lack of nonce checks, while not directly tied to an attack surface in this analysis, is a common security measure for WordPress plugins to prevent cross-site request forgery (CSRF) attacks on internal functionalities. The vulnerability history being clean is a positive indicator, suggesting a history of responsible development or a lack of past exploitable issues. Overall, the plugin appears to be built with security in mind, but the insufficient output escaping is the most significant immediate concern that warrants attention.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Creative Commons Tagger Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Creative Commons Tagger Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
6 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

38% escaped16 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
cct_settings_page (creative-commons-tagger.php:285)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Creative Commons Tagger Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterattachment_fields_to_editcreative-commons-tagger.php:25
filterattachment_fields_to_savecreative-commons-tagger.php:26
filterimg_caption_shortcodecreative-commons-tagger.php:27
actionadmin_menucreative-commons-tagger.php:28
Maintenance & Trust

Creative Commons Tagger Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedDec 30, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Creative Commons Tagger Developer Profile

Haldaug

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Creative Commons Tagger

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/creative-commons-tagger/css.css
Version Parameters
creative-commons-tagger/css.css?ver=

HTML / DOM Fingerprints

Data Attributes
attachments[${post->ID}][${field}]attachments-${post->ID}-${field}id='${sanitize_key( $field . "_" . $post->ID . "_" . $i )}'
Shortcode Output
<figure id="wp-caption-<p class="wp-caption-text">
FAQ

Frequently Asked Questions about Creative Commons Tagger