Jigsaw Security & Risk Analysis

wordpress.org/plugins/jigsaw

Simple ways to customize your WordPress build.

100 active installs v0.9.2 PHP + WP 3.7+ Updated Feb 8, 2020
adminconfiguration
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Jigsaw Safe to Use in 2026?

Generally Safe

Score 85/100

Jigsaw has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "jigsaw" plugin v0.9.2 demonstrates a generally strong security posture, with no recorded vulnerabilities or CVEs. The static analysis reveals no direct attack surface points like AJAX handlers, REST API routes, or shortcodes that are exposed without authentication or proper permission checks. Furthermore, the plugin utilizes prepared statements for all SQL queries and exhibits a high percentage of properly escaped output, which are excellent security practices. The absence of file operations and external HTTP requests also reduces the potential for certain types of attacks.

However, the presence of the `exec` function is a significant concern. While the static analysis did not identify any taint flows, the direct use of a dangerous function like `exec` without a clear indication of proper sanitization and validation of its arguments presents a potential risk. If user-supplied input or other untrusted data can influence the arguments passed to `exec`, it could lead to arbitrary command execution. The lack of nonce checks is also a weakness, as it could allow for CSRF attacks if any actions were to be performed by the plugin, though the limited attack surface currently mitigates this.

In conclusion, the plugin's lack of historical vulnerabilities and its good practices in SQL and output handling are positive indicators. However, the unrestricted use of `exec` is a notable security weakness that requires careful review and potential mitigation. The absence of nonce checks, while not currently exploited due to the limited attack surface, represents a missed opportunity for robust security.

Key Concerns

  • Use of dangerous 'exec' function
  • Missing nonce checks
Vulnerabilities
None known

Jigsaw Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Jigsaw Release Timeline

v0.9.2Current
v0.9.1
v0.8.1
v0.8.0
v0.7.0
v0.6.2
v0.6.1
v0.6
v0.5.1
v0.5
Code Analysis
Analyzed Mar 16, 2026

Jigsaw Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
1
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

execexec( 'cd ' . ABSPATH . $pathFromRoot . '; git rev-parse --verify HEAD 2> /dev/null', $output );jigsaw.php:283

Output Escaping

92% escaped13 total outputs
Attack Surface

Jigsaw Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 18
filterpost_type_linkjigsaw-permalinks.php:26
actiontemplate_redirectjigsaw-permalinks.php:91
actionpre_get_postsjigsaw-permalinks.php:100
filterpost_type_linkjigsaw-permalinks.php:122
actionpre_get_postsjigsaw-permalinks.php:125
actionadmin_enqueue_scriptsjigsaw.php:29
actionadmin_noticesjigsaw.php:41
actionadmin_bar_menujigsaw.php:47
actionadmin_bar_menujigsaw.php:82
actioninitjigsaw.php:92
actionpre_get_postsjigsaw.php:219
filtermanage_users_sortable_columnsjigsaw.php:243
actionpre_get_usersjigsaw.php:248
filterupdate_footerjigsaw.php:278
actioninitjigsaw.php:296
actioninitjigsaw.php:305
filterpost_row_actionsjigsaw.php:338
filterpage_row_actionsjigsaw.php:339
Maintenance & Trust

Jigsaw Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedFeb 8, 2020
PHP min version
Downloads17K

Community Trust

Rating98/100
Number of ratings8
Active installs100
Developer Profile

Jigsaw Developer Profile

jarednova

6 plugins · 21K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Jigsaw

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jigsaw/

HTML / DOM Fingerprints

Data Attributes
jigsaw-function
JS Globals
jigsaw_functions
FAQ

Frequently Asked Questions about Jigsaw