Nzymes Security & Risk Analysis

wordpress.org/plugins/nzymes

Boost your posts with Nzymes injections. Safely use PHP in posts' title, excerpt, and content. WordPress 4.7+ PHP 5.6+

0 active installs v1.0.0 PHP + WP 4.7+ Updated May 29, 2017
attributesauthorcustom-fieldsinjectpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Nzymes Safe to Use in 2026?

Generally Safe

Score 85/100

Nzymes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The plugin "nzymes" v1.0.0 exhibits a generally positive security posture based on the provided static analysis. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the potential attack surface. The lack of known vulnerabilities in its history further reinforces this. However, the presence of a dangerous function like `shell_exec` is a significant concern, as it can be exploited for remote code execution if not properly secured. Additionally, the fact that 100% of SQL queries are not using prepared statements poses a high risk of SQL injection vulnerabilities. The limited number of file operations and external HTTP requests are positive indicators, as is the fact that taint analysis yielded no concerning flows. The main strengths lie in its limited attack surface and clean vulnerability history, while the primary weaknesses stem from the direct use of dangerous functions and insecure SQL practices.

Key Concerns

  • Use of dangerous function (shell_exec)
  • Raw SQL queries without prepared statements
  • Missing nonce checks on potential entry points
  • Missing capability checks on potential entry points
  • Improper output escaping
Vulnerabilities
None known

Nzymes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Nzymes Code Analysis

Dangerous Functions
1
Raw SQL Queries
2
0 prepared
Unescaped Output
1
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

shell_exec$result = shell_exec( "php -n -l $filename" ); // -n = no ini, -l = only lintsrc\Nzymes\Engine.php:518

SQL Query Safety

0% prepared2 total queries

Output Escaping

67% escaped3 total outputs
Attack Surface

Nzymes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filtereditable_rolessrc\Nzymes\Plugin.php:46
actioninitsrc\Nzymes\Plugin.php:48
Maintenance & Trust

Nzymes Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedMay 29, 2017
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Nzymes Developer Profile

Andrea Ercolino

5 plugins · 480 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Nzymes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/nzymes/admin/css/nzymes.admin.css/wp-content/plugins/nzymes/admin/js/nzymes.admin.js/wp-content/plugins/nzymes/public/css/nzymes.public.css/wp-content/plugins/nzymes/public/js/nzymes.public.js
Script Paths
/wp-content/plugins/nzymes/admin/js/nzymes.admin.js/wp-content/plugins/nzymes/public/js/nzymes.public.js
Version Parameters
nzymes/admin/css/nzymes.admin.css?ver=nzymes/admin/js/nzymes.admin.js?ver=nzymes/public/css/nzymes.public.css?ver=nzymes/public/js/nzymes.public.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Prohibit direct script loading. --><!-- Copyright 2017 Andrea Ercolino --><!-- Nzymes is free software: you can redistribute it and/or modify --><!-- it under the terms of the GNU General Public License as published by -->+72 more
Data Attributes
data-nzymes-plugin-version
JS Globals
window.nzymes_admin
FAQ

Frequently Asked Questions about Nzymes