Insert ShortCode Pattern Security & Risk Analysis

wordpress.org/plugins/insert-shortcode-pattern

Шаблонный текст вставляемый на страницу при помощи шорткода. HTML теги, PHP код

10 active installs v1.1.1 PHP 5.2.4+ WP 4.6.1+ Updated Aug 30, 2019
htmljavascript%d1%88%d0%b0%d0%b1%d0%bb%d0%be%d0%bdphpshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Insert ShortCode Pattern Safe to Use in 2026?

Generally Safe

Score 85/100

Insert ShortCode Pattern has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The 'insert-shortcode-pattern' plugin v1.1.1 exhibits a generally good security posture based on the provided static analysis and vulnerability history. The absence of known CVEs and a clean vulnerability history are strong indicators of responsible development and maintenance. The plugin also demonstrates good practices by utilizing prepared statements for all SQL queries, implementing nonce checks, and capability checks for its single entry point (a shortcode). Furthermore, the attack surface is minimal and protected.

However, a significant concern arises from the low percentage (11%) of properly escaped output. With 18 total outputs, this means a substantial portion of user-generated or dynamically generated content displayed by the plugin may be vulnerable to Cross-Site Scripting (XSS) attacks. While taint analysis showed no unsanitized paths, the lack of comprehensive output escaping leaves room for potential vulnerabilities if data flows are not fully understood or if new vulnerabilities are introduced in the future. The presence of file operations (7) without specific details on their nature also warrants a note of caution, though without further analysis, it's difficult to assign a definitive risk.

In conclusion, the plugin is largely secure due to its minimal attack surface, protected entry points, and lack of known vulnerabilities. The primary weakness lies in the inadequate output escaping, which is a critical security practice. Addressing this would significantly improve the plugin's overall security.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

Insert ShortCode Pattern Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Insert ShortCode Pattern Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
2 escaped
Nonce Checks
1
Capability Checks
1
File Operations
7
External Requests
0
Bundled Libraries
0

Output Escaping

11% escaped18 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
showForm (insert-shortcode-pattern.php:71)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Insert ShortCode Pattern Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[InsertShortCodePattern] insert-shortcode-pattern.php:236
WordPress Hooks 3
actionplugins_loadedinsert-shortcode-pattern.php:230
actionwp_footerinsert-shortcode-pattern.php:237
actionadmin_menuinsert-shortcode-pattern.php:238
Maintenance & Trust

Insert ShortCode Pattern Maintenance & Trust

Maintenance Signals

WordPress version tested5.2.24
Last updatedAug 30, 2019
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Insert ShortCode Pattern Developer Profile

3vweb

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Insert ShortCode Pattern

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Insert ShortCode Pattern