Editable Recipe Security & Risk Analysis

wordpress.org/plugins/editable-recipe

This plugin allows you to enter and edit recipe-specific text from the Add New Post page. The output fits the hRecipe format and is SEO friendly.

10 active installs v2.0 PHP + WP 3.6.1+ Updated Dec 19, 2014
foodhrecipeingredientsrecipe
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Editable Recipe Safe to Use in 2026?

Generally Safe

Score 85/100

Editable Recipe has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "editable-recipe" v2.0 plugin exhibits a generally good security posture, primarily due to the absence of known vulnerabilities and the adherence to several security best practices in its code. The plugin successfully avoids dangerous functions, performs all SQL queries using prepared statements, and includes nonce and capability checks, which are crucial for securing WordPress functionalities. Furthermore, the static analysis did not reveal any critical or high-severity taint flows, nor did it identify any unsanitized paths, indicating a cautious approach to handling user-provided data within the analyzed code.

However, there are areas that warrant attention to further strengthen its security. A significant concern is the low percentage of properly escaped output (36%). This suggests a risk of Cross-Site Scripting (XSS) vulnerabilities if user-provided data is displayed without adequate sanitization. While no XSS vulnerabilities were explicitly detected in this static analysis, the insufficient escaping creates a fertile ground for such attacks, especially if the plugin's functionality evolves or new attack vectors are discovered. The plugin's limited attack surface is a positive, but the lack of robust output escaping is the primary weakness identified.

The plugin's vulnerability history is notably clean, with no recorded CVEs. This is a strong indicator of responsible development and a proactive approach to security by the authors. The absence of past issues suggests that the codebase has likely been maintained with security in mind. In conclusion, "editable-recipe" v2.0 is currently in a relatively secure state, but the significant gap in output escaping represents a notable risk that should be addressed to achieve a more robust security profile.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Editable Recipe Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Editable Recipe Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
9 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

36% escaped25 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
pluginOptions (editableRecipe.php:279)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Editable Recipe Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[editablerecipe] editableRecipe.php:372
WordPress Hooks 6
actionadmin_initeditableRecipe.php:367
actionsave_posteditableRecipe.php:368
actionwp_headeditableRecipe.php:371
actionadmin_menueditableRecipe.php:381
filterquery_varseditableRecipe.php:384
actiontemplate_redirecteditableRecipe.php:385
Maintenance & Trust

Editable Recipe Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedDec 19, 2014
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Editable Recipe Developer Profile

reasonedpenguin

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Editable Recipe

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/editable-recipe/css/er_main.css/wp-content/plugins/editable-recipe/images/print1.gif

HTML / DOM Fingerprints

CSS Classes
hrecipefneditableRecipe_photophotosummaryeditableRecipe_ingredients
Data Attributes
id="editableRecipe_fn_field"name="editableRecipe_fn_field"id="editableRecipe_photo_field"name="editableRecipe_photo_field"id="editableRecipe_ingredients"id="editableRecipe_ingredient_field"+22 more
JS Globals
er_editableRecipePrintObj
Shortcode Output
<div id="editableRecipe_content" class="hrecipe"><h1 class="fn"><div class="editableRecipe_photo"><img class="photo" src="<p class="summary">
FAQ

Frequently Asked Questions about Editable Recipe