Parole chiave in evidenza Security & Risk Analysis

wordpress.org/plugins/parole-chiave-in-evidenza

Questo plugin permette di evidenziare parola importante dentro le pagine e articoli. Hai le possibilità di renderle grassetto, corsivo, sottolineato, …

200 active installs v1.0.0 PHP + WP 2.0.0+ Updated Nov 25, 2013
parole-chiave-in-evidenzaparole-chiave-seoposizionamento-in-googleposizionamento-seoseo-parole-chiave
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Parole chiave in evidenza Safe to Use in 2026?

Generally Safe

Score 85/100

Parole chiave in evidenza has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "parole-chiave-in-evidenza" v1.0.0 plugin exhibits a generally good security posture based on the provided static analysis. The absence of any identified CVEs in its history and the lack of dangerous functions or file operations are positive indicators. The plugin also demonstrates strong practices regarding SQL queries by exclusively using prepared statements, and it makes no external HTTP requests.

However, a significant concern arises from the complete lack of output escaping. This means that any data displayed by the plugin is not being sanitized, making it vulnerable to Cross-Site Scripting (XSS) attacks. Furthermore, the absence of nonce and capability checks across all potential entry points, although currently limited, is a weakness that could be exploited if the plugin's attack surface were to expand in future versions.

In conclusion, while the plugin has a clean historical record and employs secure practices in areas like database interaction, the unescaped output represents a critical security flaw. The lack of comprehensive security checks like nonces and capability checks also introduces potential risks, especially if the plugin's functionality grows. Addressing the output escaping is paramount to mitigating immediate XSS vulnerabilities.

Key Concerns

  • Output escaping is not implemented
  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

Parole chiave in evidenza Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Parole chiave in evidenza Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped10 total outputs
Attack Surface

Parole chiave in evidenza Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuparole-chiave-in-evidenza.php:10
actionadmin_initparole-chiave-in-evidenza.php:11
filterthe_contentparole-chiave-in-evidenza.php:168
actionwp_headparole-chiave-in-evidenza.php:260
Maintenance & Trust

Parole chiave in evidenza Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedNov 25, 2013
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs200
Alternatives

Parole chiave in evidenza Alternatives

No alternatives data available yet.

Developer Profile

Parole chiave in evidenza Developer Profile

Ovidiu Purdea

4 plugins · 280 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Parole chiave in evidenza

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
wh_highlighted
FAQ

Frequently Asked Questions about Parole chiave in evidenza