Library Security & Risk Analysis

wordpress.org/plugins/library

Create a library of reusable terms (strings) and display their contents anywhere on your site with a shortcode.

900 active installs v1.1.0 PHP + WP 3.8.1+ Updated Dec 31, 2015
contentdictionarylibraryshortcodesstrings
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Library Safe to Use in 2026?

Generally Safe

Score 85/100

Library has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "library" v1.1.0 plugin exhibits a generally good security posture based on the provided static analysis. There are no identified dangerous functions, file operations, external HTTP requests, or SQL queries that are not using prepared statements. This indicates a solid foundation in common secure coding practices. The attack surface is minimal, with only one shortcode, and no AJAX handlers or REST API routes are exposed without appropriate authentication or permission checks. The lack of identified taint flows further suggests that the plugin is not susceptible to common injection vulnerabilities.

However, there are a few areas that warrant attention. Notably, the plugin has no nonce checks, which is a critical security mechanism for preventing CSRF attacks. Additionally, half of the output operations are not properly escaped, potentially exposing the site to Cross-Site Scripting (XSS) vulnerabilities. The absence of capability checks on its entry points means that any user, regardless of their role, could potentially interact with the shortcode, which could lead to unintended consequences if the shortcode's functionality is sensitive.

The plugin's vulnerability history is clean, with no recorded CVEs. This is a positive indicator, but it should be considered in conjunction with the identified code-level weaknesses. The lack of historical vulnerabilities might be due to the plugin's limited functionality or simply good fortune, rather than a proactive security implementation. While the current state is not alarming, the unescaped outputs and missing nonce checks represent tangible risks that should be addressed.

Key Concerns

  • Missing nonce checks
  • Half of output operations not escaped
  • No capability checks on entry points
Vulnerabilities
None known

Library Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Library Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped4 total outputs
Attack Surface

Library Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[library] public\class-library.php:69
WordPress Hooks 8
actioninitadmin\class-library-admin.php:53
actionload-post.phpadmin\class-library-admin.php:56
actionmedia_buttonsadmin\class-library-admin.php:58
actionadmin_footeradmin\class-library-admin.php:60
actionadd_meta_boxesadmin\class-library-admin.php:118
actionplugins_loadedlibrary.php:39
actionplugins_loadedlibrary.php:48
actioninitpublic\class-library.php:66
Maintenance & Trust

Library Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 31, 2015
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs900
Developer Profile

Library Developer Profile

Patrick Daly

3 plugins · 970 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Library

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<div class="library-term-content">
FAQ

Frequently Asked Questions about Library