
PCSH (PastaCode and SyntaxHighlighter) Security & Risk Analysis
wordpress.org/plugins/pcsh-pastacode-syntaxhighlighterUse PCSH to add code into your posts with the awesome SyntaxHighlighter plugin. So, past'a code!
Is PCSH (PastaCode and SyntaxHighlighter) Safe to Use in 2026?
Generally Safe
Score 85/100PCSH (PastaCode and SyntaxHighlighter) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The plugin 'pcsh-pastacode-syntaxhighlighter' v0.4.2 demonstrates a generally positive security posture, with no known vulnerabilities in its history and a significant portion of its code outputs being properly escaped. The static analysis reveals a limited attack surface with only one shortcode and no unprotected AJAX handlers or REST API routes. Furthermore, the plugin implements nonce and capability checks, indicating an effort to secure its entry points.
However, there are areas for improvement. The most significant concern is the presence of SQL queries that are not prepared statements. With two SQL queries identified and 0% using prepared statements, this presents a risk of SQL injection vulnerabilities if user-supplied data is directly incorporated into these queries. The plugin also makes several external HTTP requests, which, without further analysis of their destinations and handling, could potentially be a vector for various attacks. The bundled TinyMCE library, while common, warrants a check for known vulnerabilities in its specific version.
Given the absence of historical vulnerabilities and the presence of some security controls, the plugin is not in immediate critical danger. However, the lack of prepared statements for all SQL queries is a notable weakness that should be addressed to prevent potential exploits. The plugin's strengths lie in its limited attack surface and existing authentication checks, but its reliance on potentially unsafe SQL practices requires attention.
Key Concerns
- SQL queries without prepared statements
- External HTTP requests identified
- Bundled library (TinyMCE) may have vulnerabilities
PCSH (PastaCode and SyntaxHighlighter) Security Vulnerabilities
PCSH (PastaCode and SyntaxHighlighter) Code Analysis
Bundled Libraries
SQL Query Safety
Output Escaping
PCSH (PastaCode and SyntaxHighlighter) Attack Surface
Shortcodes 1
WordPress Hooks 17
Maintenance & Trust
PCSH (PastaCode and SyntaxHighlighter) Maintenance & Trust
Maintenance Signals
Community Trust
PCSH (PastaCode and SyntaxHighlighter) Alternatives
Github README
github-readme
Easily embed GitHub READMEs in pages/posts.
GetGit
getgit
Embeds syntax-highlighted GitHub repo content into your blog posts.
Gist for Robots WordPress Plugin
gist-for-robots-wordpress
Makes embedding Github.com gists SEO friendly and super awesomely easy.
GitHub Gist WordPress Plugin
github-gist
GitHub Gist Wordpress Plugin allows you to embed GitHub Gist snippets with a [gist] tag, instead of copying and pasting HTML.
Github Shortcode
github-shortcode
Easily display GitHub Repositories in Pages/Posts.
PCSH (PastaCode and SyntaxHighlighter) Developer Profile
1 plugin · 10 total installs
How We Detect PCSH (PastaCode and SyntaxHighlighter)
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pcsh-pastacode-syntaxhighlighter/css/SyntaxHighlighter.css/wp-content/plugins/pcsh-pastacode-syntaxhighlighter/css/SyntaxHighlighter.css?ver=HTML / DOM Fingerprints
code-embed-wrappercode-embed-infoscode-embed-namecode-embed-rawpcsh_messagebrushtab-sizehighlight/wp-json/wp/v2/posts<div class="code-embed-wrapper"><pre class="brush:"></pre>