Inline Manual Security & Risk Analysis

wordpress.org/plugins/inlinemanual

Connect Inline Manual with your Wordpress.

10 active installs v0.9 PHP + WP 3.3+ Updated Dec 4, 2015
helplearntrainingtutorialtutorials
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Inline Manual Safe to Use in 2026?

Generally Safe

Score 85/100

Inline Manual has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the provided static analysis, the "inlinemanual" plugin v0.9 exhibits a strong security posture in several key areas. The complete absence of identified dangerous functions, raw SQL queries, file operations, external HTTP requests, and unsanitized taint flows is highly commendable. Furthermore, the plugin shows no history of known vulnerabilities (CVEs), indicating a generally stable and secure codebase over its known history.

However, there are notable areas of concern that detract from its overall security. The plugin lacks any nonce or capability checks across its entire codebase, and a significant portion (43%) of its output is not properly escaped. This absence of authorization and validation mechanisms, coupled with unescaped output, creates potential attack vectors. For instance, an attacker could potentially inject malicious content or manipulate plugin behavior if an entry point were discovered, even though the current analysis shows a zero attack surface. The lack of identified entry points is positive, but the fundamental security checks (nonces, capabilities) are missing, making it vulnerable should any entry points be introduced in future updates or through interaction with other plugins.

In conclusion, while "inlinemanual" v0.9 demonstrates a good foundation with its avoidance of common risky code patterns and a clean vulnerability history, the absence of crucial security checks like nonce and capability verifications, alongside a substantial amount of unescaped output, represents significant weaknesses. These issues necessitate attention to prevent potential security incidents.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • Significant unescaped output (43%)
Vulnerabilities
None known

Inline Manual Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Inline Manual Release Timeline

v1.0
v0.9Current
v0.5
v0.4
v0.3
Code Analysis
Analyzed Mar 16, 2026

Inline Manual Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

57% escaped7 total outputs
Attack Surface

Inline Manual Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuclass.inlinemanual-admin.php:5
actionadmin_initclass.inlinemanual-admin.php:6
actionadmin_print_scriptsclass.inlinemanual-admin.php:11
actioninitinlinemanual.php:25
actioninitinlinemanual.php:29
Maintenance & Trust

Inline Manual Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedDec 4, 2015
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Inline Manual Developer Profile

2046

6 plugins · 140 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Inline Manual

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/inlinemanual/css/im-admin.css

HTML / DOM Fingerprints

CSS Classes
im-config-wrapim-headerim-column-leftim-boxim-column-rightbutton-cta
Data Attributes
name="front_site_api_key"name="site_api_key"name="im_frontend_roles[im_anonymous]"name="im_frontend_roles[name="im_admin_roles[
JS Globals
localStorage.setItem('InmPlayerCurrent', '{"topic_id":"2089","step_id":0}');
FAQ

Frequently Asked Questions about Inline Manual