Lexicographer Security & Risk Analysis

wordpress.org/plugins/lexicographer

Lexicographer creates an alphabetical index of your blog, using keywords you choose. The index can be included in any page, post or text widget.

20 active installs v0.9.4 PHP + WP 2.8.4+ Updated May 14, 2020
dictionaryglossaryindexlemmaswords
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Lexicographer Safe to Use in 2026?

Generally Safe

Score 85/100

Lexicographer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "lexicographer" v0.9.4 exhibits a mixed security posture. On the positive side, the static analysis reveals no dangerous functions, no file operations, no external HTTP requests, and all identified output is properly escaped. The vulnerability history is also clean, with no recorded CVEs, which is a strong indicator of good security practices by the developers. Furthermore, the attack surface is minimal, with only one shortcode and no AJAX handlers or REST API routes, and importantly, no unprotected entry points were identified.

However, a significant concern arises from the SQL query handling. All 10 SQL queries are executed without using prepared statements. This represents a substantial risk, as it makes the plugin vulnerable to SQL injection attacks if any user-controlled data is incorporated into these queries, despite the absence of taint analysis findings in this specific scan. The lack of nonce and capability checks, while not directly linked to identified vulnerabilities in this scan, could also be a point of concern in a broader security context, particularly if the shortcode or any other functions were to evolve to handle user input or sensitive operations.

In conclusion, while the plugin benefits from a small attack surface, no dangerous code signals, and a clean vulnerability history, the universal use of raw SQL queries is a critical weakness that significantly elevates its risk profile. Addressing this by implementing prepared statements for all SQL queries should be the top priority for improving the plugin's security.

Key Concerns

  • Raw SQL queries without prepared statements
Vulnerabilities
None known

Lexicographer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Lexicographer Code Analysis

Dangerous Functions
0
Raw SQL Queries
10
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared10 total queries
Attack Surface

Lexicographer Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[lexicographer_index] lexicographer.php:46
WordPress Hooks 4
actiontransition_post_statuslexicographer.php:42
filterwidget_textlexicographer.php:47
filterthe_contentlexicographer.php:50
filterwidget_textlexicographer.php:51
Maintenance & Trust

Lexicographer Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMay 14, 2020
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings2
Active installs20
Developer Profile

Lexicographer Developer Profile

texttheater

3 plugins · 4K total installs

69
trust score
Avg Security Score
85/100
Avg Patch Time
358 days
View full developer profile
Detection Fingerprints

How We Detect Lexicographer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lexicographer/css/lexicographer.css/wp-content/plugins/lexicographer/js/lexicographer.js
Script Paths
/wp-content/plugins/lexicographer/js/lexicographer.js
Version Parameters
lexicographer/css/lexicographer.css?ver=lexicographer/js/lexicographer.js?ver=

HTML / DOM Fingerprints

CSS Classes
lexicographer-index
HTML Comments
<!-- Lexicographer index generated by Kilian Evang -->
Shortcode Output
[lexicographer_index
FAQ

Frequently Asked Questions about Lexicographer