Include Me Security & Risk Analysis

wordpress.org/plugins/include-me

Include Me helps to include any external file (textual, HTML or PHP) in posts or pages.

4K active installs v1.3.7 PHP 7.0+ WP 6.1+ Updated Feb 5, 2026
external-pageiframeincludephpphp-execute
97
A · Safe
CVEs total2
Unpatched0
Last CVESep 9, 2025
Safety Verdict

Is Include Me Safe to Use in 2026?

Generally Safe

Score 97/100

Include Me has a strong security track record. Known vulnerabilities have been patched promptly.

2 known CVEsLast CVE: Sep 9, 2025Updated 1mo ago
Risk Assessment

The 'include-me' plugin v1.3.7 exhibits a mixed security posture. While the static analysis reveals good practices such as 100% output escaping and the presence of nonce and capability checks, the lack of prepared statements for its single SQL query is a significant concern, especially given its vulnerability history. The total absence of unprotected entry points (AJAX, REST API) is a strong positive sign, indicating that immediate public-facing code execution is well-protected. However, the plugin's past vulnerabilities, including Cross-site Scripting and PHP Remote File Inclusion, are critical red flags. The presence of these severe vulnerability types in its history, despite no currently unpatched CVEs, suggests a recurring pattern of insecure coding practices that may not be fully addressed by the current version. While the static analysis does not reveal active critical or high severity taint flows, the historical data strongly indicates a latent risk that users should be aware of. Therefore, users should proceed with caution and ensure diligent updating practices.

Key Concerns

  • SQL queries not using prepared statements
  • Total known CVEs (2) in history
  • High severity historical CVE (1)
  • Medium severity historical CVE (1)
Vulnerabilities
2

Include Me Security Vulnerabilities

CVEs by Year

1 CVE in 2022
2022
1 CVE in 2025
2025
Patched Has unpatched

Severity Breakdown

High
1
Medium
1

2 total CVEs

CVE-2025-58983medium · 4.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Include Me <= 1.3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting

Sep 9, 2025 Patched in 1.3.3 (7d)
CVE-2021-24453high · 8.8Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Include Me <= 1.2.1 - Local File Inclusion leading to Authenticated Remote Code Execution

Jan 2, 2022 Patched in 1.2.2 (751d)
Code Analysis
Analyzed Mar 16, 2026

Include Me Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
11 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

100% escaped11 total outputs
Data Flows
All sanitized

Data Flow Analysis

1 flows
<options> (admin\options.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Include Me Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[includeme] plugin.php:141
WordPress Hooks 1
actionadmin_menuplugin.php:22
Maintenance & Trust

Include Me Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 5, 2026
PHP min version7.0
Downloads91K

Community Trust

Rating96/100
Number of ratings21
Active installs4K
Developer Profile

Include Me Developer Profile

Stefano Lissa

14 plugins · 515K total installs

75
trust score
Avg Security Score
94/100
Avg Patch Time
650 days
View full developer profile
Detection Fingerprints

How We Detect Include Me

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p>Include me shortcode: the file attribute is empty</p><p>The provided file (<code></code>) does not exist. <strong>This message is shown only to administrators</strong>.</p><p>The provided file (<code>
FAQ

Frequently Asked Questions about Include Me