OpenSearchServer Search Security & Risk Analysis

wordpress.org/plugins/opensearchserver-search

The OpenSearchServer Search Plugin enables OpenSearchServer full-text search in WordPress-based websites.

10 active installs v1.5.10 PHP + WP 3.0.1+ Updated May 5, 2015
full-textopensearchserverphoneticsearchsearch-engine
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is OpenSearchServer Search Safe to Use in 2026?

Generally Safe

Score 85/100

OpenSearchServer Search has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "opensearchserver-search" plugin v1.5.10 presents a mixed security posture. On the positive side, the plugin has no known CVEs, a clean vulnerability history, and a seemingly small attack surface in terms of direct entry points like AJAX handlers, REST API routes, and shortcodes. The absence of dangerous functions, file operations, and external HTTP requests is also reassuring.

However, several areas raise significant concerns. The taint analysis reveals that all 8 analyzed flows have unsanitized paths, indicating potential vulnerabilities that could be exploited if these flows are triggered by user input. Furthermore, the plugin exhibits a critical weakness in output escaping, with only 3% of 115 outputs being properly escaped. This leaves the plugin highly susceptible to Cross-Site Scripting (XSS) attacks. The complete lack of nonce checks and capability checks across all identified entry points, combined with the presence of cron events which are often overlooked for security, further exacerbates these risks.

In conclusion, while the plugin benefits from a lack of historical vulnerabilities and a limited direct attack surface, the pervasive issue with unsanitized paths in taint analysis and the severe lack of output escaping are major security red flags. These issues, coupled with the absence of nonces and capability checks, create a substantial risk of XSS and other injection vulnerabilities. Developers should prioritize addressing these specific code-level weaknesses to improve the plugin's security.

Key Concerns

  • All taint flows have unsanitized paths
  • Very low percentage of properly escaped output
  • No nonce checks detected
  • No capability checks detected
  • SQL queries not fully using prepared statements
Vulnerabilities
None known

OpenSearchServer Search Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

OpenSearchServer Search Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
8 prepared
Unescaped Output
112
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

73% prepared11 total queries

Output Escaping

3% escaped115 total outputs
Data Flows
8 unsanitized

Data Flow Analysis

8 flows8 with unsanitized paths
<autocomplete> (autocomplete.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

OpenSearchServer Search Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedindex.php:35
actionadmin_headindex.php:232
actionsave_postindex.php:249
actionwp_enqueue_scriptsindex.php:250
actionadmin_menuindex.php:251
actiontemplate_redirectindex.php:252
actionsynchronize_with_cronindex.php:253
filterquery_varsindex.php:254

Scheduled Events 2

synchronize_with_cron
synchronize_with_cron
Maintenance & Trust

OpenSearchServer Search Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMay 5, 2015
PHP min version
Downloads9K

Community Trust

Rating84/100
Number of ratings5
Active installs10
Developer Profile

OpenSearchServer Search Developer Profile

ekeller

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OpenSearchServer Search

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/opensearchserver-search/js/opensearchserver.js/wp-content/plugins/opensearchserver-search/css/oss-style.css
Script Paths
/wp-content/plugins/opensearchserver-search/js/opensearchserver.js
Version Parameters
opensearchserver-search/js/opensearchserver.js?ver=opensearchserver-search/css/oss-style.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about OpenSearchServer Search