Markdown for WordPress and bbPress Security & Risk Analysis

wordpress.org/plugins/markdown-for-wordpress-and-bbpress

A text-to-HTML conversion tool for web writers

60 active installs v1.0 PHP + WP 1.2+ Updated May 21, 2008
encodingformatformattingposttext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Markdown for WordPress and bbPress Safe to Use in 2026?

Generally Safe

Score 85/100

Markdown for WordPress and bbPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "markdown-for-wordpress-and-bbpress" plugin v1.0 demonstrates a seemingly strong security posture based on the static analysis provided. The plugin has no apparent attack surface in terms of AJAX handlers, REST API routes, shortcodes, or cron events, and crucially, none of these entry points are unprotected. The code also shows good practices with 100% of SQL queries using prepared statements and 100% of outputs being properly escaped. Furthermore, there are no recorded vulnerabilities or CVEs associated with this plugin, which is a positive indicator of its historical security and development quality.

However, a significant concern arises from the presence of the `create_function` PHP construct. This function is deprecated and considered a security risk due to its potential to be exploited for arbitrary code execution if user-supplied input is used within its creation without proper sanitization. While the taint analysis reported no issues, the mere presence of this dangerous function warrants caution. The lack of any observed nonce or capability checks, while aligned with the zero attack surface, also means there's no explicit defense mechanism in place should any entry points be accidentally exposed in future updates or through unforeseen interactions.

In conclusion, the plugin benefits from a clean vulnerability history and good coding practices in areas like SQL and output escaping. The absence of an attack surface is also a strength. The primary weakness lies in the use of the `create_function` construct, which represents a latent security risk. The lack of explicit capability checks on what would be considered entry points (if they existed) is a missed opportunity for robust security. Overall, while currently appearing safe, the use of `create_function` prevents a perfect security score and requires careful monitoring and potential refactoring.

Key Concerns

  • Use of dangerous function (create_function)
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Markdown for WordPress and bbPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Markdown for WordPress and bbPress Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$this->utf8_strlen = create_function('$text', 'return preg_match_all(markdown.php:1545
Attack Surface

Markdown for WordPress and bbPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 20
filterthe_contentmarkdown.php:123
filterthe_content_rssmarkdown.php:124
filterget_the_excerptmarkdown.php:125
filterget_the_excerptmarkdown.php:126
filterthe_excerptmarkdown.php:127
filterthe_excerpt_rssmarkdown.php:128
filterthe_contentmarkdown.php:132
filterget_the_excerptmarkdown.php:133
filterpre_comment_contentmarkdown.php:144
filterpre_comment_contentmarkdown.php:145
filterpre_comment_contentmarkdown.php:146
filterget_comment_textmarkdown.php:147
filterget_comment_excerptmarkdown.php:148
filterget_comment_excerptmarkdown.php:149
filterpost_textmarkdown.php:180
filterpost_textmarkdown.php:181
filterpost_textmarkdown.php:182
filterpost_textmarkdown.php:183
filterpost_textmarkdown.php:184
filterbb_allowed_tagsmarkdown.php:185
Maintenance & Trust

Markdown for WordPress and bbPress Maintenance & Trust

Maintenance Signals

WordPress version tested2.5.1
Last updatedMay 21, 2008
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings1
Active installs60
Developer Profile

Markdown for WordPress and bbPress Developer Profile

mitcho (Michael Yoshitaka Erlewine)

13 plugins · 6K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Markdown for WordPress and bbPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
More details about how it works here: # <http://www.michelf.com/weblog/2005/wordpress-text-flow-vs-markdown/>Based on the WordPress text flow, as analyzed by Michel Fortin: # <http://www.michelf.com/weblog/2005/wordpress-text-flow-vs-markdown/>
JS Globals
mdwp_hidden_tagsmdwp_placeholders
FAQ

Frequently Asked Questions about Markdown for WordPress and bbPress