MaxiCharts CSV Source add-on Security & Risk Analysis

wordpress.org/plugins/maxicharts-csv-source-add-on

Create beautiful HTML5 charts from CSV files datas with a simple shortcode.

30 active installs v1.3.2 PHP + WP 4.0+ Updated Sep 20, 2021
chartcommacsvseparatedvalues
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is MaxiCharts CSV Source add-on Safe to Use in 2026?

Generally Safe

Score 85/100

MaxiCharts CSV Source add-on has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The maxicharts-csv-source-add-on plugin, version 1.3.2, exhibits a generally strong security posture based on the provided static analysis. There are no recorded vulnerabilities in its history, and the static analysis reveals no dangerous functions, raw SQL queries, unsanitized taint flows, or external HTTP requests. All identified SQL queries use prepared statements, and all output is properly escaped. This indicates good development practices in these critical security areas.

However, there are areas that warrant caution. The plugin has an attack surface of one shortcode, but crucially, there are no recorded capability checks or nonce checks in place for any of its entry points. While the static analysis did not uncover any vulnerabilities directly, the absence of robust access control mechanisms like capability checks on the shortcode is a significant concern. This could potentially lead to unauthorized execution of shortcode functionality if an attacker can find a way to trigger it without proper authentication.

In conclusion, while the plugin demonstrates commendable practices in areas like SQL sanitization and output escaping, the lack of comprehensive security checks on its shortcode entry point presents a notable weakness. The absence of a vulnerability history is positive, but it does not negate the potential risks posed by the missing access controls. Careful consideration should be given to implementing appropriate checks to mitigate the identified risk.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
Vulnerabilities
None known

MaxiCharts CSV Source add-on Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

MaxiCharts CSV Source add-on Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

MaxiCharts CSV Source add-on Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[csv2chartjs] mcharts_csv_source_add_on.php:48
WordPress Hooks 4
filtermaxicharts_get_data_from_sourcemcharts_csv_source_add_on.php:53
filtermcharts_filter_defaults_parametersmcharts_csv_source_add_on.php:58
filtermcharts_return_without_graphmcharts_csv_source_add_on.php:62
filterwp_check_filetype_and_extmcharts_csv_source_add_on.php:704
Maintenance & Trust

MaxiCharts CSV Source add-on Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 20, 2021
PHP min version
Downloads3K

Community Trust

Rating90/100
Number of ratings2
Active installs30
Developer Profile

MaxiCharts CSV Source add-on Developer Profile

termel

14 plugins · 800 total installs

83
trust score
Avg Security Score
84/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MaxiCharts CSV Source add-on

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/maxicharts-csv-source-add-on/mcharts_csv_source_add_on.php

HTML / DOM Fingerprints

Shortcode Output
[csv2chartjs]
FAQ

Frequently Asked Questions about MaxiCharts CSV Source add-on