Qlik for WordPress Security & Risk Analysis

wordpress.org/plugins/qlikview-syntax-highlighter

Tools for Qlik bloggers including inserting Qlik UI icons and automatic syntax highlighting of QlikView and Qlik Sense script/expressions on any WordP …

20 active installs v2.0 PHP + WP 4.0+ Updated Feb 14, 2018
highlightqlikqlik-senseqlikviewsyntax
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Qlik for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Qlik for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The 'qlikview-syntax-highlighter' plugin v2.0 exhibits a strong security posture based on the provided static analysis. The absence of any dangerous functions, SQL queries without prepared statements, and unescaped output indicates good coding practices in these critical areas. Furthermore, the plugin successfully implements capability checks for its entry points, and there are no known vulnerabilities (CVEs) associated with it, which is a significant positive indicator. The limited attack surface, with no unprotected AJAX handlers or REST API routes, further contributes to its security. The primary area for potential concern, albeit minor, is the presence of a file operation. While not inherently insecure, file operations can sometimes be a vector for vulnerabilities if not handled with extreme care, especially regarding user-supplied input. However, without further details on the nature of this file operation, it's difficult to assess its specific risk level. Overall, the plugin appears to be well-secured, with no immediate critical threats identified.

Key Concerns

  • Presence of file operations
Vulnerabilities
None known

Qlik for WordPress Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Qlik for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0
Attack Surface

Qlik for WordPress Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[qlik-code] qlikview-highlight.php:229
[qlikview] qlikview-highlight.php:230
[qlik-icon] qlikview-highlight.php:260
WordPress Hooks 11
actionplugins_loadedqlikview-highlight.php:47
actionadmin_menuqlikview-highlight.php:56
actionadmin_initqlikview-highlight.php:66
actionadmin_enqueue_scriptsqlikview-highlight.php:135
actionwp_enqueue_scriptsqlikview-highlight.php:172
filterthe_contentqlikview-highlight.php:240
actionadmin_print_footer_scriptsqlikview-highlight.php:322
filtermce_external_pluginsqlikview-highlight.php:344
filtermce_buttonsqlikview-highlight.php:345
actioninitqlikview-highlight.php:348
actionadmin_headqlikview-highlight.php:371
Maintenance & Trust

Qlik for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedFeb 14, 2018
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Qlik for WordPress Developer Profile

Matthew Fryer

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Qlik for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/qlikview-syntax-highlighter/css/qlik-admin.css/wp-content/plugins/qlikview-syntax-highlighter/css/qlik-icons.css
Version Parameters
qlik-admin.css?ver=qlik-icons.css?ver=

HTML / DOM Fingerprints

CSS Classes
qlik-highlight-admin
FAQ

Frequently Asked Questions about Qlik for WordPress