Enzymes Security & Risk Analysis

wordpress.org/plugins/enzymes

Retrieve properties and custom fields of posts, pages, and authors, right into the visual editor of posts and pages, and everywhere else.

10 active installs v2.3 PHP + WP 3.0+ Updated Jun 27, 2010
custom-fieldsenzymesinclusionpropertiestransclusion
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Enzymes Safe to Use in 2026?

Generally Safe

Score 85/100

Enzymes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The "enzymes" v2.3 plugin exhibits a very low static analysis risk profile, with no identified attack surface entry points and no detected dangerous functions or taint flows. This suggests a strong adherence to secure coding practices in these specific areas, which is commendable. The absence of any recorded vulnerabilities, CVEs, or past security issues further contributes to a positive security posture. However, the code analysis does reveal significant concerns. Notably, 100% of SQL queries are not using prepared statements, presenting a high risk of SQL injection vulnerabilities. Additionally, a very low percentage (6%) of output escaping suggests a substantial risk of cross-site scripting (XSS) vulnerabilities. The complete lack of nonce checks and capability checks, especially given the absence of clearly defined entry points to scrutinize, leaves potential for privilege escalation or unauthorized actions if any hidden or future entry points are discovered. While the lack of known vulnerabilities is reassuring, the identified code quality issues in SQL and output handling represent a significant latent risk that requires immediate attention.

Key Concerns

  • SQL queries not using prepared statements
  • Low percentage of output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Enzymes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Enzymes Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
17
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

6% escaped18 total outputs
Attack Surface

Enzymes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
filterwp_titleenzymes.php:428
filterthe_titleenzymes.php:429
filterthe_title_rssenzymes.php:430
filterthe_excerptenzymes.php:431
filterthe_excerpt_rssenzymes.php:432
filterthe_contentenzymes.php:433
Maintenance & Trust

Enzymes Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedJun 27, 2010
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Enzymes Developer Profile

Andrea Ercolino

5 plugins · 480 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Enzymes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/enzymes/templates//wp-content/plugins/enzymes/js/
Script Paths
/wp-content/plugins/enzymes/js/enzymes.js
Version Parameters
enzymes/css/enzymes.css?ver=enzymes/js/enzymes.js?ver=

HTML / DOM Fingerprints

JS Globals
enzymes
Shortcode Output
{[
FAQ

Frequently Asked Questions about Enzymes