PCSH (PastaCode and SyntaxHighlighter) Security & Risk Analysis

wordpress.org/plugins/pcsh-pastacode-syntaxhighlighter

Use PCSH to add code into your posts with the awesome SyntaxHighlighter plugin. So, past'a code!

10 active installs v0.4.2 PHP + WP 3.1+ Updated Dec 10, 2015
bitbucketcodeembedgithubversion
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PCSH (PastaCode and SyntaxHighlighter) Safe to Use in 2026?

Generally Safe

Score 85/100

PCSH (PastaCode and SyntaxHighlighter) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The plugin 'pcsh-pastacode-syntaxhighlighter' v0.4.2 demonstrates a generally positive security posture, with no known vulnerabilities in its history and a significant portion of its code outputs being properly escaped. The static analysis reveals a limited attack surface with only one shortcode and no unprotected AJAX handlers or REST API routes. Furthermore, the plugin implements nonce and capability checks, indicating an effort to secure its entry points.

However, there are areas for improvement. The most significant concern is the presence of SQL queries that are not prepared statements. With two SQL queries identified and 0% using prepared statements, this presents a risk of SQL injection vulnerabilities if user-supplied data is directly incorporated into these queries. The plugin also makes several external HTTP requests, which, without further analysis of their destinations and handling, could potentially be a vector for various attacks. The bundled TinyMCE library, while common, warrants a check for known vulnerabilities in its specific version.

Given the absence of historical vulnerabilities and the presence of some security controls, the plugin is not in immediate critical danger. However, the lack of prepared statements for all SQL queries is a notable weakness that should be addressed to prevent potential exploits. The plugin's strengths lie in its limited attack surface and existing authentication checks, but its reliance on potentially unsafe SQL practices requires attention.

Key Concerns

  • SQL queries without prepared statements
  • External HTTP requests identified
  • Bundled library (TinyMCE) may have vulnerabilities
Vulnerabilities
None known

PCSH (PastaCode and SyntaxHighlighter) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PCSH (PastaCode and SyntaxHighlighter) Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
5
15 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
6
Bundled Libraries
1

Bundled Libraries

TinyMCE

SQL Query Safety

0% prepared2 total queries

Output Escaping

75% escaped20 total outputs
Attack Surface

PCSH (PastaCode and SyntaxHighlighter) Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[pcsh] pastacodeSH.php:54
WordPress Hooks 17
actionplugins_loadedpastacodeSH.php:21
actionwp_enqueue_scriptspastacodeSH.php:36
filterpcsh_githubpastacodeSH.php:218
filterpcsh_gistpastacodeSH.php:277
filterpcsh_bitbucketpastacodeSH.php:308
filterpcsh_filepastacodeSH.php:346
filterpcsh_pastebinpastacodeSH.php:375
filterpcsh_manualpastacodeSH.php:404
filterplugin_row_metapastacodeSH.php:460
filteradmin_post_pcsh_drop_transientspastacodeSH.php:493
actionadmin_menupastacodeSH.php:520
actionadmin_initpastacodeSH.php:695
filtermce_external_pluginspastacodeSH.php:709
filtermce_buttonspastacodeSH.php:710
actionadmin_enqueue_scriptspastacodeSH.php:740
actionadmin_initpastacodeSH.php:753
actionbefore_wp_tiny_mcepastacodeSH.php:765
Maintenance & Trust

PCSH (PastaCode and SyntaxHighlighter) Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 10, 2015
PHP min version
Downloads3K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

PCSH (PastaCode and SyntaxHighlighter) Developer Profile

Oleg Soromin

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PCSH (PastaCode and SyntaxHighlighter)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/pcsh-pastacode-syntaxhighlighter/css/SyntaxHighlighter.css
Version Parameters
/wp-content/plugins/pcsh-pastacode-syntaxhighlighter/css/SyntaxHighlighter.css?ver=

HTML / DOM Fingerprints

CSS Classes
code-embed-wrappercode-embed-infoscode-embed-namecode-embed-rawpcsh_message
Data Attributes
brushtab-sizehighlight
REST Endpoints
/wp-json/wp/v2/posts
Shortcode Output
<div class="code-embed-wrapper"><pre class="brush:"></pre>
FAQ

Frequently Asked Questions about PCSH (PastaCode and SyntaxHighlighter)