Hide Element Shortcode Security & Risk Analysis

wordpress.org/plugins/hide-element

You can now hide any parts of the content, with this shortcode. It also can hide other shortcodes.

100 active installs v1.0.0 PHP + WP 3.0+ Updated Oct 5, 2015
hideshortcodevisual-composer
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hide Element Shortcode Safe to Use in 2026?

Generally Safe

Score 85/100

Hide Element Shortcode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The 'hide-element' plugin v1.0.0 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of dangerous functions, reliance on prepared statements for SQL queries, and proper output escaping are all positive indicators. The plugin also demonstrates good practice by not performing file operations or external HTTP requests. Furthermore, the vulnerability history shows a clean slate with no known CVEs, suggesting consistent security attention or a lack of exploitable features.

However, the analysis does highlight potential areas for improvement. The presence of a shortcode, while not inherently insecure, represents an entry point that could become a vector if not handled with extreme care. The complete lack of nonce and capability checks across all entry points is a significant concern. This means that any user, regardless of their privileges, could potentially trigger the functionality of the shortcode. While the static analysis found no immediate exploitable taint flows or dangerous functions, the lack of proper authorization checks makes it vulnerable to privilege escalation or unauthorized execution of its intended (and potentially unknown) functionality.

In conclusion, 'hide-element' v1.0.0 is strong in its internal code hygiene, avoiding common pitfalls like raw SQL or unescaped output. However, its external-facing security is significantly weakened by the complete absence of authentication and authorization checks on its sole entry point. This creates a considerable risk that could be mitigated by implementing appropriate checks.

Key Concerns

  • Shortcode entry point with no auth checks
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Hide Element Shortcode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hide Element Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Hide Element Shortcode Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[hide] hide-element.php:32
WordPress Hooks 3
actionplugins_loadedhide-element.php:28
actionwp_loadedhide-element.php:29
filterthe_contenthide-element.php:31
Maintenance & Trust

Hide Element Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 5, 2015
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Hide Element Shortcode Developer Profile

Daniel Käfer

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hide Element Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
hide_element="true"hide_element='true'
Shortcode Output
[hide][/hide]
FAQ

Frequently Asked Questions about Hide Element Shortcode