Custom Index Shortcode Security & Risk Analysis

wordpress.org/plugins/custom-index-shortcode

Create customizable lists of pages by using a simple shortcode which can be called directly from buttons in both TinyMCE and HTML editors.

10 active installs v1.3 PHP + WP 3.3+ Updated Oct 14, 2014
list-of-pageslistspages-listsshortcodetinymce-button
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Custom Index Shortcode Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Index Shortcode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "custom-index-shortcode" v1.3 plugin exhibits a mixed security posture. On the positive side, it demonstrates good practices by not making external HTTP requests, performing file operations, or utilizing dangerous functions. Furthermore, all SQL queries are properly prepared, and there's no recorded vulnerability history, suggesting a generally stable codebase.

However, significant concerns arise from the static analysis. A notable weakness is that 0% of its 17 output operations are properly escaped. This lack of output escaping is a critical security flaw, as it opens the door to Cross-Site Scripting (XSS) vulnerabilities, where malicious scripts could be injected into the website and executed in the user's browser. Additionally, the absence of nonce checks and capability checks on the identified shortcode entry point is a concern, as it could potentially allow unauthorized users to trigger shortcode functionality if the shortcode itself is designed to perform sensitive actions. The lack of taint analysis results also means that potential data flow vulnerabilities that might not be immediately obvious through function calls remain unevaluated.

In conclusion, while the plugin has some strong security foundations, the severe lack of output escaping presents a clear and present danger. The absence of authorization checks on the shortcode is also a point of attention. Addressing the output escaping issue should be a top priority to mitigate the risk of XSS attacks. Future development should also consider implementing nonce and capability checks for the shortcode's functionality to ensure proper authorization.

Key Concerns

  • 100% of outputs are unescaped
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Custom Index Shortcode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Custom Index Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
17
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped17 total outputs
Attack Surface

Custom Index Shortcode Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[custom-index] index.php:11
WordPress Hooks 5
actionadmin_print_footer_scriptsindex.php:212
filtermce_external_pluginsindex.php:229
filtermce_buttonsindex.php:230
actionadmin_headindex.php:233
actionadmin_enqueue_scriptsindex.php:251
Maintenance & Trust

Custom Index Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedOct 14, 2014
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings1
Active installs10
Developer Profile

Custom Index Shortcode Developer Profile

teuteca

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Index Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
QTags
Shortcode Output
<li><a href=<?php echo get_page_link( $page->ID ); ?><?php echo $page->post_title; ?>[custom-index]
FAQ

Frequently Asked Questions about Custom Index Shortcode