Dottoro Syntax Highlighter Security & Risk Analysis

wordpress.org/plugins/dottoro-syntax-highlighter

Colorize your source code as easily as possible. Dottoro Highlighter provides professional coloring for CSS, HTML, JavaScript and XML languages.

10 active installs v1.3 PHP + WP 2.7+ Updated Feb 21, 2010
csshtmljavascriptsyntaxxml
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Dottoro Syntax Highlighter Safe to Use in 2026?

Generally Safe

Score 85/100

Dottoro Syntax Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The dottoro-syntax-highlighter plugin v1.3 presents a mixed security posture. On the positive side, the plugin has a remarkably small attack surface with no apparent AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the vulnerability history shows no recorded CVEs, suggesting a generally stable and secure past.

However, the static analysis reveals significant concerns. The presence of the `unserialize` function without any apparent sanitization or validation is a critical risk. This function can be exploited to deserialize malicious data, leading to arbitrary code execution. Additionally, a substantial percentage of SQL queries are not using prepared statements, increasing the risk of SQL injection vulnerabilities. The most alarming finding is that 0% of output is properly escaped, meaning any dynamic content rendered by the plugin is highly susceptible to cross-site scripting (XSS) attacks.

While the lack of historical vulnerabilities is a good sign, it doesn't mitigate the critical risks identified in the current code. The plugin needs immediate attention regarding output escaping and the use of `unserialize`. The reliance on capability checks for security also needs to be evaluated in conjunction with the unescaped output, as it might not be sufficient to prevent exploitation.

Key Concerns

  • Unescaped output found
  • Dangerous function 'unserialize' used
  • SQL queries not using prepared statements
Vulnerabilities
None known

Dottoro Syntax Highlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dottoro Syntax Highlighter Release Timeline

v1.3Current
v1.2
v1.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

Dottoro Syntax Highlighter Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
5 prepared
Unescaped Output
19
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
1

Dangerous Functions Found

unserializereturn unserialize (get_option('dr_highlighter_settings'));dottoro_syntax_highlighter.php:327

Bundled Libraries

TinyMCE

SQL Query Safety

71% prepared7 total queries

Output Escaping

0% escaped19 total outputs
Attack Surface

Dottoro Syntax Highlighter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
filtertiny_mce_before_initdottoro_syntax_highlighter.php:62
filtermce_external_pluginsdottoro_syntax_highlighter.php:72
filtermce_buttonsdottoro_syntax_highlighter.php:73
actioninitdottoro_syntax_highlighter.php:93
actionadmin_print_scriptsdottoro_syntax_highlighter.php:118
actionadmin_menudottoro_syntax_highlighter.php:728
actionwp_headdottoro_syntax_highlighter.php:729
actionsave_postdottoro_syntax_highlighter.php:732
filterthe_contentdottoro_syntax_highlighter.php:735
Maintenance & Trust

Dottoro Syntax Highlighter Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedFeb 21, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Dottoro Syntax Highlighter Developer Profile

dottoro

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dottoro Syntax Highlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dottoro-syntax-highlighter/public/dottoro-highlighter-v2-min.css/wp-content/plugins/dottoro-syntax-highlighter/public/dottoro-highlighter-v2-min.js/wp-content/plugins/dottoro-syntax-highlighter/public/themes//wp-content/plugins/dottoro-syntax-highlighter/jquery-ui-1.8rc1.custom.css/wp-content/plugins/dottoro-syntax-highlighter/dr_syntax_highlighter_quicktags.js
Script Paths
/wp-content/plugins/dottoro-syntax-highlighter/public/dottoro-highlighter-v2-min.js/wp-content/plugins/dottoro-syntax-highlighter/dr_syntax_highlighter_tinymce.js/wp-content/plugins/dottoro-syntax-highlighter/dr_syntax_highlighter_quicktags.js
Version Parameters
/dottoro-syntax-highlighter/public/dottoro-highlighter-v2-min.css?ver=/dottoro-syntax-highlighter/public/dottoro-highlighter-v2-min.js?ver=/dottoro-syntax-highlighter/public/themes//dottoro-syntax-highlighter/jquery-ui-1.8rc1.custom.css?ver=/dottoro-syntax-highlighter/dr_syntax_highlighter_quicktags.js?ver=

HTML / DOM Fingerprints

Data Attributes
drsyntax
JS Globals
dr_highlighter_plugin_dir
FAQ

Frequently Asked Questions about Dottoro Syntax Highlighter