Mentionable Security & Risk Analysis

wordpress.org/plugins/mentionable

Mention WordPress content with inline autocomplete inside tinyMCE.

100 active installs v0.4.3 PHP + WP 4.1+ Updated Nov 24, 2015
adminmentiontinymce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Mentionable Safe to Use in 2026?

Generally Safe

Score 85/100

Mentionable has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "mentionable" plugin v0.4.3 exhibits a generally strong security posture based on the provided static analysis. It has a very limited attack surface, with only one AJAX handler, and crucially, this entry point appears to have authentication checks. The absence of SQL injection vulnerabilities, the use of prepared statements for all queries, and the presence of nonce and capability checks are all positive indicators. There are also no recorded vulnerabilities in its history, suggesting a history of stable and secure development.

However, there are areas for improvement. The output escaping is only properly handled for 63% of outputs, leaving a potential for cross-site scripting (XSS) vulnerabilities. While taint analysis shows no issues, this may be due to the limited scope of analysis or the absence of complex data flows. The presence of file operations without further context is also a minor concern, as these can sometimes be vectors for insecure operations if not handled carefully.

Overall, the plugin appears to be relatively secure due to its small attack surface, proper authentication, and lack of historical vulnerabilities. The primary concern lies in the incomplete output escaping, which warrants attention to prevent potential XSS flaws.

Key Concerns

  • Incomplete output escaping
Vulnerabilities
None known

Mentionable Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Mentionable Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
5 escaped
Nonce Checks
1
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

63% escaped8 total outputs
Attack Surface

Mentionable Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_get_mentionableincludes\mentionable-autocomplete.php:17
WordPress Hooks 13
filterposts_whereincludes\mentionable-autocomplete.php:33
filterthe_contentincludes\mentionable-content.php:25
actionsave_postincludes\mentionable-postmetas.php:24
actionpre_post_updateincludes\mentionable-postmetas.php:25
actionadmin_menuincludes\mentionable-settings.php:28
actionadmin_initincludes\mentionable-settings.php:31
actionplugins_loadedmentionable.php:97
actionplugins_loadedmentionable.php:100
actionafter_setup_themementionable.php:103
actionadmin_initmentionable.php:152
filtermce_cssmentionable.php:156
actionadmin_enqueue_scriptsmentionable.php:159
filtermce_external_pluginsmentionable.php:185
Maintenance & Trust

Mentionable Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedNov 24, 2015
PHP min version
Downloads9K

Community Trust

Rating86/100
Number of ratings10
Active installs100
Developer Profile

Mentionable Developer Profile

Jonathan Bardo

5 plugins · 710 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Mentionable

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/mentionable/css/mentionable-style.css/wp-content/plugins/mentionable/css/mentionable-tmce-style.css/wp-content/plugins/mentionable/js/mentionable-tmce.js
Script Paths
/wp-content/plugins/mentionable/js/mentionable-tmce.js
Version Parameters
mentionable_css?ver=0.4.0

HTML / DOM Fingerprints

Data Attributes
data-mentionable-options
JS Globals
mentionable
FAQ

Frequently Asked Questions about Mentionable