Insights Security & Risk Analysis

wordpress.org/plugins/insights

Insights allows you to quickly access and insert information (links, images, videos, maps..) into your blog posts.

300 active installs v1.0.8 PHP + WP 2.3+ Updated Dec 22, 2014
admingoogleimageslinksposts
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Insights Safe to Use in 2026?

Generally Safe

Score 85/100

Insights has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "insights" v1.0.8 plugin presents a mixed security posture. On the positive side, it has a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, there are no known historical vulnerabilities, suggesting a generally stable development history. However, the static analysis reveals significant concerns within the codebase itself. The presence of the "unserialize" function, combined with a taint analysis flow with unsanitized paths, indicates a high risk of remote code execution or sensitive data exposure if user-supplied input is not rigorously validated before being passed to "unserialize". Additionally, the complete lack of output escaping and the use of raw SQL queries without prepared statements are serious security flaws that can lead to cross-site scripting (XSS) and SQL injection vulnerabilities, respectively.

Key Concerns

  • Unsanitized taint flow
  • Dangerous function: unserialize
  • Raw SQL without prepared statements
  • 0% output escaping
Vulnerabilities
None known

Insights Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Insights Code Analysis

Dangerous Functions
2
Raw SQL Queries
1
0 prepared
Unescaped Output
13
0 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

unserialize$rsp_obj = unserialize($rsp);insights-ajax.php:143
unserialize$rsp_obj = unserialize($rsp);insights-ajax.php:240

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped13 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<insights-ajax> (insights-ajax.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Insights Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuinsights.php:39
actionadmin_print_scripts-post.phpinsights.php:42
actionadmin_print_scripts-page.phpinsights.php:43
actionadmin_print_scripts-post-new.phpinsights.php:44
actionadmin_print_scripts-page-new.phpinsights.php:45
filtermce_external_pluginsinsights.php:58
filtermce_buttonsinsights.php:59
Maintenance & Trust

Insights Maintenance & Trust

Maintenance Signals

WordPress version tested4.2.39
Last updatedDec 22, 2014
PHP min version
Downloads150K

Community Trust

Rating96/100
Number of ratings5
Active installs300
Developer Profile

Insights Developer Profile

Vladimir Prelovac

20 plugins · 1.0M total installs

70
trust score
Avg Security Score
87/100
Avg Patch Time
2577 days
View full developer profile
Detection Fingerprints

How We Detect Insights

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/insights/js/insights.js/wp-content/plugins/insights/js/insights-maps.js/wp-content/plugins/insights/js/jQuery.jCache.js
Script Paths
/wp-content/plugins/insights/js/insights-mceplugin.js
Version Parameters
insights/js/insights.js?ver=insights/js/insights-maps.js?ver=insights/js/jQuery.jCache.js?ver=

HTML / DOM Fingerprints

CSS Classes
insights-searchinsights-submitinsights-resultsinsights-map-allinsights-map
Data Attributes
id="insights-search"id="insights-submit"id="insights-radio"id="insights-results"id="insights-map-all"id="insights-map"+4 more
JS Globals
InsightsSettings
FAQ

Frequently Asked Questions about Insights