Insert Link Reference In Copied Text Security & Risk Analysis

wordpress.org/plugins/insert-reference

This plugin will add a reference from which site someone copied a text.

20 active installs v2 PHP 7.3.5+ WP 4.7+ Updated Jun 6, 2022
copyinsertpaste
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Insert Link Reference In Copied Text Safe to Use in 2026?

Generally Safe

Score 85/100

Insert Link Reference In Copied Text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "insert-reference" v2 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface entry points (AJAX handlers, REST API routes, shortcodes, cron events) is a significant positive, indicating that the plugin is designed to minimize external interaction points that could be exploited. Furthermore, the lack of dangerous functions, file operations, and external HTTP requests further reinforces this secure design. The taint analysis revealing no unsanitized paths is also reassuring.

However, there are areas for concern. The presence of two SQL queries, both entirely unescaped, represents a direct risk of SQL injection vulnerabilities. While no specific vulnerabilities have been recorded in its history, this is not a guarantee of future security, especially given the identified SQL query practice. The 60% output escaping rate, while not terrible, still leaves 40% of outputs potentially unescaped, which could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not properly handled.

In conclusion, the "insert-reference" v2 plugin has a commendable focus on reducing its attack surface. Nevertheless, the identified SQL practices and partially unescaped output present tangible risks that should be addressed to achieve a truly robust security profile. The lack of historical vulnerabilities is a good sign but should not overshadow the present code-level concerns.

Key Concerns

  • Raw SQL queries without prepared statements
  • Unescaped output in 40% of cases
Vulnerabilities
None known

Insert Link Reference In Copied Text Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Insert Link Reference In Copied Text Release Timeline

v2Current
v1
Code Analysis
Analyzed Mar 16, 2026

Insert Link Reference In Copied Text Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
2
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries

Output Escaping

60% escaped5 total outputs
Attack Surface

Insert Link Reference In Copied Text Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_headFunctions.php:47
actionadmin_menuReference.php:13
Maintenance & Trust

Insert Link Reference In Copied Text Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedJun 6, 2022
PHP min version7.3.5
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Insert Link Reference In Copied Text Developer Profile

Mushlih Almubarak

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Insert Link Reference In Copied Text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
ILRICT_add_linkILRICT_check_data
FAQ

Frequently Asked Questions about Insert Link Reference In Copied Text