
Processing Projects Security & Risk Analysis
wordpress.org/plugins/processing-projectsThis plugin allows you to upload Processing (p5.js) Projects to your WordPress website. The Processing Projects you upload should be in a zip file tha …
Is Processing Projects Safe to Use in 2026?
High Risk
Score 39/100Processing Projects carries significant security risk with 2 known CVEs, 2 still unpatched. Consider switching to a maintained alternative.
The "processing-projects" plugin version 1.0.2 exhibits a mixed security posture. While the static analysis indicates no critical vulnerabilities within the analyzed code, such as dangerous functions, raw SQL queries, or direct taint flows, several concerning signals are present. Notably, only 13% of output is properly escaped, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities, especially given the plugin's past issues. The presence of file operations, though not explicitly flagged as dangerous in this analysis, warrants caution. The plugin's vulnerability history is a significant concern, with two known CVEs, both of which are currently unpatched. These past vulnerabilities, including Unrestricted Upload of File with Dangerous Type and Cross-Site Scripting, along with the recent disclosure date (2025-04-08), suggest a pattern of security weaknesses that have not been adequately addressed.
Despite the lack of immediate, critical threats detected in the current static analysis, the unpatched historical vulnerabilities represent a substantial ongoing risk. The high percentage of unescaped output further amplifies the potential for XSS attacks. The plugin has a small attack surface with only one entry point (a shortcode) and has implemented some capability checks and a nonce check, which are positive indicators. However, the historical pattern of security flaws and the lack of patches for known CVEs significantly overshadow these positive aspects, making the plugin a high-risk component in its current state.
Key Concerns
- Unpatched high severity CVE
- Unpatched medium severity CVE
- Low percentage of properly escaped output
- File operations present
Processing Projects Security Vulnerabilities
CVEs by Year
Severity Breakdown
2 total CVEs
Processing Projects <= 1.0.2 - Authenticated (Shop Manager+) Arbitrary File Upload
Processing Projects <= 1.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Processing Projects Code Analysis
Output Escaping
Processing Projects Attack Surface
Shortcodes 1
WordPress Hooks 11
Maintenance & Trust
Processing Projects Maintenance & Trust
Maintenance Signals
Community Trust
Processing Projects Alternatives
Processing JS
processingjs
A plugin for WordPress to make it easy to include Processing.js sketches into blog posts.
Processing-js-Easy
processing-js-easy
Includes and executes graphical javascript applications that have been written with processing (.pde)
Easy p5.js Block
easy-p5-js-block
Adds a Gutenberg block to easily add custom p5.js code in your pages and preview it as you edit.
p5.js Block
wp-p5js-block
Run p5.js in your WordPress site with this Gutenberg block.
Responsive P5JS for WP
responsive-p5js-for-wp
Embed your P5JS sketches in posts and pages in a responsive way
Processing Projects Developer Profile
2 plugins · 100 total installs
How We Detect Processing Projects
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
upload-projectdata-pp-shortcode<iframe src="