Essential Shortcodes Security & Risk Analysis

wordpress.org/plugins/essential-shortcodes

Display user information and date/time with easy-to-use shortcodes. Free version includes 8 essential shortcodes.

10 active installs v1.1 PHP 7.4+ WP 4.9+ Updated Jun 11, 2025
dateemailshortcodesuser-infousername
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Essential Shortcodes Safe to Use in 2026?

Generally Safe

Score 100/100

Essential Shortcodes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The plugin "essential-shortcodes" v1.1 presents a mixed security posture. On the positive side, the static analysis reveals no identified dangerous functions, no direct SQL queries (all use prepared statements), and no file operations or external HTTP requests, which significantly reduces common attack vectors. The absence of known CVEs and a clean vulnerability history also suggests a generally well-maintained codebase.

However, a critical concern emerges from the output escaping analysis: 0% of the 8 total outputs are properly escaped. This lack of proper output sanitization, especially within shortcodes which are a direct entry point, creates a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by these shortcodes that originates from user input or external sources could be exploited to inject malicious scripts into the user's browser.

The plugin's attack surface consists solely of 8 shortcodes, none of which are flagged as unprotected. While this is good, the complete lack of output escaping negates this benefit. The absence of taint analysis flows and non-critical code signals might indicate a simpler codebase or that the analysis tools were limited, but the output escaping issue is a concrete and severe vulnerability.

Key Concerns

  • 0% of outputs properly escaped
Vulnerabilities
None known

Essential Shortcodes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Essential Shortcodes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped8 total outputs
Attack Surface

Essential Shortcodes Attack Surface

Entry Points8
Unprotected0

Shortcodes 8

[essesh_username] essential-shortcodes.php:200
[essesh_email] essential-shortcodes.php:210
[essesh_firstname] essential-shortcodes.php:220
[essesh_lastname] essential-shortcodes.php:230
[essesh_bio] essential-shortcodes.php:240
[essesh_avatar] essential-shortcodes.php:259
[essesh_date] essential-shortcodes.php:273
[essesh_time] essential-shortcodes.php:287
WordPress Hooks 2
actionadmin_menuessential-shortcodes.php:29
actionadmin_enqueue_scriptsessential-shortcodes.php:104
Maintenance & Trust

Essential Shortcodes Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 11, 2025
PHP min version7.4
Downloads270

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Essential Shortcodes Developer Profile

haohunter

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Essential Shortcodes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
essesh-copy-buttonessesh-shortcode-cell
Data Attributes
data-shortcode
JS Globals
esseshShowCopySuccess
Shortcode Output
[essesh_username][essesh_email][essesh_firstname][essesh_lastname]
FAQ

Frequently Asked Questions about Essential Shortcodes