Dictionary Security & Risk Analysis

wordpress.org/plugins/dictionary

This plugin adds a widget that shows random word and it's definiton.

10 active installs v1.0 PHP + WP 2.7+ Updated Jun 25, 2013
dictionaryvocabuary
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dictionary Safe to Use in 2026?

Generally Safe

Score 85/100

Dictionary has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "dictionary" plugin v1.0 exhibits a mixed security posture. On the positive side, the static analysis indicates a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events, and crucially, no unprotected entry points. The plugin also exclusively uses prepared statements for its SQL queries, which is a strong security practice. However, there are significant concerns regarding output escaping, with only 16% of outputs being properly escaped. This leaves the plugin vulnerable to cross-site scripting (XSS) attacks if any of the unescaped outputs are controllable by an attacker. Furthermore, while the taint analysis found no critical or high severity issues, it did reveal three flows with unsanitized paths, which could potentially lead to path traversal vulnerabilities if these paths are user-influenced and not properly validated or sanitized. The vulnerability history is a significant strength, showing no known CVEs, which suggests a history of secure development or diligent patching. Despite the lack of historical vulnerabilities and a small attack surface, the poor output escaping and presence of unsanitized paths are notable weaknesses that require attention to ensure user data and site integrity are protected.

Key Concerns

  • Poor output escaping (16% proper)
  • Unsanitized paths in taint flows (3 flows)
  • File operations detected (3)
  • No nonce checks on entry points
Vulnerabilities
None known

Dictionary Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dictionary Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 17, 2026

Dictionary Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
31
6 escaped
Nonce Checks
0
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

16% escaped37 total outputs
Data Flows · Security
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
<search-word> (search-word.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Dictionary Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menuadmin.php:3
actionwidgets_initwidget.php:188
actioninitwidget.php:196
Maintenance & Trust

Dictionary Maintenance & Trust

Maintenance Signals

WordPress version tested3.5.2
Last updatedJun 25, 2013
PHP min version
Downloads3K

Community Trust

Rating60/100
Number of ratings1
Active installs10
Developer Profile

Dictionary Developer Profile

ajayver

5 plugins · 150 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dictionary

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
word-definitionword_overriderefresh_wordsword-search
Data Attributes
data-words_to_showdata-word_override
JS Globals
refresh_words
REST Endpoints
/wp-json/dictionary/v1/show-random/wp-json/dictionary/v1/search-word
FAQ

Frequently Asked Questions about Dictionary