
Pretty Table of Contents for Elementor Security & Risk Analysis
wordpress.org/plugins/pretty-table-of-contents-for-elementorRemake of the Elementor Pro Table of Contents widget, with, nice, pretty, readable urls.
Is Pretty Table of Contents for Elementor Safe to Use in 2026?
Generally Safe
Score 85/100Pretty Table of Contents for Elementor has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of the 'pretty-table-of-contents-for-elementor' plugin version 1.0.1 reveals a seemingly strong security posture based on the reported metrics. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, and importantly, none of these are noted as unprotected. Furthermore, the analysis indicates no dangerous functions, no direct SQL queries, no file operations, and no external HTTP requests, all of which are positive security indicators. The lack of any recorded vulnerabilities, including CVEs, further reinforces this perception of a secure plugin.
However, a significant concern arises from the output escaping metric. With 2 total outputs and 0% properly escaped, this indicates a high likelihood of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data or dynamic content rendered by the plugin that is not properly escaped can be exploited by attackers to inject malicious scripts into the user's browser. The absence of nonce and capability checks, while not directly tied to exposed entry points in this analysis, could become a risk if new entry points are introduced or if existing, seemingly safe, functions are later leveraged in an unauthorized manner.
In conclusion, while the plugin boasts a minimal attack surface and a clean vulnerability history, the critical flaw in output escaping represents a substantial risk that overshadows these strengths. Addressing the unescaped output is paramount to improving the plugin's overall security. The current state presents a trade-off between a small attack vector and a critical vulnerability that can be exploited through the plugin's rendering mechanisms.
Key Concerns
- Unescaped output
Pretty Table of Contents for Elementor Security Vulnerabilities
Pretty Table of Contents for Elementor Code Analysis
Output Escaping
Pretty Table of Contents for Elementor Attack Surface
WordPress Hooks 1
Maintenance & Trust
Pretty Table of Contents for Elementor Maintenance & Trust
Maintenance Signals
Community Trust
Pretty Table of Contents for Elementor Alternatives
No alternatives data available yet.
Pretty Table of Contents for Elementor Developer Profile
3 plugins · 350 total installs
How We Detect Pretty Table of Contents for Elementor
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/pretty-table-of-contents-for-elementor/assets/css/style.css/wp-content/plugins/pretty-table-of-contents-for-elementor/assets/js/scripts.js/wp-content/plugins/pretty-table-of-contents-for-elementor/assets/js/scripts.jspretty-table-of-contents-for-elementor/assets/css/style.css?ver=pretty-table-of-contents-for-elementor/assets/js/scripts.js?ver=HTML / DOM Fingerprints
elementor-widget-pretty-toc-elementordata-elementor-iddata-elementor-post-typedata-elementor-type