{eac}Doojigger Readme Extension for WordPress Security & Risk Analysis

wordpress.org/plugins/eacreadme

{eac}Readme loads and translates a WordPress markdown 'readme' file providing shortcodes and embedding URLs to access header lines and section blocks.

0 active installs v1.5.1 PHP 7.4+ WP 5.8+ Updated Aug 8, 2025
code-highlightingeacdoojiggermarkdownparsedownreadme
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is {eac}Doojigger Readme Extension for WordPress Safe to Use in 2026?

Generally Safe

Score 100/100

{eac}Doojigger Readme Extension for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The "eacreadme" v1.5.1 plugin presents a mixed security picture. On the positive side, the plugin exhibits excellent practices regarding SQL queries, exclusively using prepared statements, and all identified output is properly escaped, minimizing risks of cross-site scripting (XSS). Furthermore, there is no recorded vulnerability history, suggesting a generally secure codebase over time. The absence of external HTTP requests and bundled libraries also reduces the attack surface related to third-party vulnerabilities.

However, the static analysis reveals significant concerns. The presence of the `unserialize` function is a critical red flag. Without proper sanitization or validation of the data being unserialized, this function can lead to Remote Code Execution (RCE) vulnerabilities. While the taint analysis did not flag critical or high severity flows, the fact that there are "flows with unsanitized paths" warrants caution, especially when combined with `unserialize`. Additionally, the complete lack of nonce checks and capability checks, particularly if any functionality were to be exposed through future updates or undocumented means, represents a significant oversight in securing actions within the plugin.

In conclusion, while "eacreadme" v1.5.1 has strengths in its handling of SQL and output, the presence of `unserialize` and the absence of robust authentication and authorization mechanisms (nonces, capability checks) are significant weaknesses. The lack of historical vulnerabilities is a positive indicator but does not negate the inherent risks identified in the current code analysis.

Key Concerns

  • Use of unserialize function without checks
  • Taint flows with unsanitized paths found
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

{eac}Doojigger Readme Extension for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

{eac}Doojigger Readme Extension for WordPress Release Timeline

v1.5.1Current
v1.5.0
v1.4.5
v1.4.4
v1.4.3
v1.4.2
v1.4.1
v1.4.0
v1.3.0
v1.2.6
v1.2.5
v1.2.4
v1.2.3
v1.2.2
v1.2.0
v1.1.1
v1.1.0
Code Analysis
Analyzed Apr 16, 2026

{eac}Doojigger Readme Extension for WordPress Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize&& ($content = unserialize($content)) )Extensions/class.eacReadme.parser.php:781

Output Escaping

100% escaped3 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
_getGithubProfile (Extensions/class.eacReadme.parser.php:810)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

{eac}Doojigger Readme Extension for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_initExtensions/class.eacReadme.extension.php:50
actionoptions_settings_pageExtensions/class.eacReadme.extension.php:54
actionoptions_settings_helpExtensions/class.eacReadme.extension.php:56
filteroptions_form_post_readme_code_languageExtensions/class.eacReadme.extension.php:111
filteroptions_form_post_readme_code_styleExtensions/class.eacReadme.extension.php:112
filtereacDoojigger_load_extensionseacReadme.php:47
filtereacReadme_load_parsereacReadme.php:83
Maintenance & Trust

{eac}Doojigger Readme Extension for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 8, 2025
PHP min version7.4
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

{eac}Doojigger Readme Extension for WordPress Developer Profile

Kevin Burkholder

11 plugins · 60 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect {eac}Doojigger Readme Extension for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eacreadme/vendor/prism/prism.css/wp-content/plugins/eacreadme/vendor/prism/prism.js
Script Paths
/wp-content/plugins/eacreadme/vendor/prism/prism.js
Version Parameters
eacreadme/vendor/prism/prism.js?ver=eacreadme/vendor/prism/prism.css?ver=

HTML / DOM Fingerprints

CSS Classes
language-phplanguage-javascriptlanguage-csslanguage-htmllanguage-cliketokencommentprolog+33 more
HTML Comments
<!-- {eac}Readme loads and translates a WordPress readme.txt file providing shortcodes to access header lines, section blocks, or the entire document. -->
Data Attributes
data-language
JS Globals
Prism
Shortcode Output
[eacReadme][eacReadme plugin='eacreadme/readme.txt']
FAQ

Frequently Asked Questions about {eac}Doojigger Readme Extension for WordPress