Pointalize FAQ Markup Security & Risk Analysis

wordpress.org/plugins/pointalize-faq-markup

Automatically adds FAQPage JSON-LD markup to WordPress posts and pages for Google Rich Results.

10 active installs v1.3 PHP 7.4+ WP 5.0+ Updated Oct 25, 2025
json-ldrich-resultsschemaseostructured-data
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Pointalize FAQ Markup Safe to Use in 2026?

Generally Safe

Score 100/100

Pointalize FAQ Markup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The 'pointalize-faq-markup' v1.3 plugin exhibits a generally good security posture based on the provided static analysis. A key strength is the complete absence of dangerous functions, SQL queries using prepared statements, file operations, external HTTP requests, and external HTTP requests. Furthermore, the plugin has no known historical vulnerabilities, indicating a mature and well-maintained codebase.

However, a significant concern arises from the complete lack of output escaping. With one output identified and none properly escaped, there is a high risk of Cross-Site Scripting (XSS) vulnerabilities if any user-provided data is displayed without sanitization. The absence of capability checks and nonce checks on the zero identified entry points, while seemingly benign due to the lack of entry points, suggests a potential weakness in the plugin's overall security architecture if new entry points were to be introduced without proper security considerations. The lack of taint analysis data is also a limitation, as it prevents a deeper understanding of potential data flow vulnerabilities.

In conclusion, while the plugin has demonstrated a strong foundation by avoiding common pitfalls like raw SQL and dangerous functions, the unescaped output represents a critical, exploitable flaw. The absence of vulnerabilities in its history is positive, but this should not lead to complacency. Addressing the output escaping issue is paramount to securing this plugin.

Key Concerns

  • Unescaped output
  • No capability checks
  • No nonce checks
Vulnerabilities
None known

Pointalize FAQ Markup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Pointalize FAQ Markup Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Pointalize FAQ Markup Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_headpointalize-faq-markup.php:90
Maintenance & Trust

Pointalize FAQ Markup Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 25, 2025
PHP min version7.4
Downloads217

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Pointalize FAQ Markup Developer Profile

Pointalize

2 plugins · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Pointalize FAQ Markup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<script type="application/ld+json">
FAQ

Frequently Asked Questions about Pointalize FAQ Markup