Custom Shortcodes Security & Risk Analysis

wordpress.org/plugins/custom-shortcodes

Manage custom fields using the insert shortcodes or HTML comment in text of post.

6K active installs v1.0 PHP + WP 2.0.2+ Updated Apr 4, 2009
customcustom-fieldspostshortcodestext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Custom Shortcodes Safe to Use in 2026?

Generally Safe

Score 85/100

Custom Shortcodes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The custom-shortcodes plugin version 1.0 exhibits an exceptionally strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events, coupled with zero unprotected entry points, indicates a minimal attack surface. Furthermore, the code signals reveal an impressive adherence to secure coding practices, with no dangerous functions, all SQL queries using prepared statements, and 100% output escaping. The lack of file operations, external HTTP requests, and crucially, the absence of nonce and capability checks across all identified (zero) entry points, are all positive indicators. The vulnerability history is also clean, with no known CVEs. This plugin appears to be developed with a strong security-first mindset. However, the primary concern arises from the complete absence of any detected entry points or security checks (nonces, capabilities). While this contributes to a low attack surface, it also means there's no evidence that these critical security mechanisms are being used where they would typically be necessary if the plugin were to evolve and gain functionality. The current state suggests a plugin with potentially no user-facing interaction or dynamic functionality, making its security strengths context-dependent. In its current form, it is remarkably secure, but its limited scope prevents a full evaluation of its security robustness under more complex operational conditions.

Key Concerns

  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Custom Shortcodes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Custom Shortcodes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Custom Shortcodes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtercontent_save_precustom-shortcodes.php:15
actionsave_postcustom-shortcodes.php:22
filterthe_contentcustom-shortcodes.php:67
Maintenance & Trust

Custom Shortcodes Maintenance & Trust

Maintenance Signals

WordPress version tested2.7
Last updatedApr 4, 2009
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs6K
Developer Profile

Custom Shortcodes Developer Profile

marapper

6 plugins · 8K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Custom Shortcodes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!--custom $1-->
Data Attributes
data-custom-namedata-custom-value
Shortcode Output
[custom name="$1" value="$2"]<!--custom name="$1" value="$2"-->
FAQ

Frequently Asked Questions about Custom Shortcodes