Ragic Shortcode Security & Risk Analysis

wordpress.org/plugins/ragic-shortcode

Allows the use of a special shortcode for embedding Ragic forms.

80 active installs v1.3 PHP + WP 2.6+ Updated Nov 22, 2024
embed-formragicshortcode
91
A · Safe
CVEs total1
Unpatched0
Last CVENov 27, 2024
Download
Safety Verdict

Is Ragic Shortcode Safe to Use in 2026?

Generally Safe

Score 91/100

Ragic Shortcode has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Nov 27, 2024Updated 1yr ago
Risk Assessment

The "ragic-shortcode" plugin v1.3 exhibits a generally positive security posture based on the static analysis. It adheres to several good security practices, notably by not using any dangerous functions, executing all SQL queries with prepared statements, and ensuring all output is properly escaped. Furthermore, it avoids file operations, external HTTP requests, and does not bundle any external libraries, which reduces potential attack vectors. The attack surface is minimal, consisting solely of one shortcode, and importantly, there are no unprotected entry points identified in this analysis. Taint analysis also indicates no critical or high severity flows, suggesting a lack of easily exploitable data handling vulnerabilities within the current code.

However, the plugin's security record is tarnished by its vulnerability history. The presence of one known CVE, even if currently patched, suggests past issues that required remediation. The fact that this vulnerability was of medium severity and related to Cross-site Scripting (XSS) is a concern, as XSS can lead to account takeovers and other serious security breaches. While the current version may be patched, the historical pattern warrants caution. The absence of nonce and capability checks on its single shortcode entry point is also a potential weakness, as it means any user could potentially trigger its functionality, although the lack of other exploitable code signals mitigates this risk significantly in the current version. The lack of these checks on shortcodes could be a future vulnerability if the shortcode's functionality evolves to handle sensitive data or actions.

In conclusion, while "ragic-shortcode" v1.3 demonstrates commendable coding practices in its current implementation, particularly regarding SQL and output handling, its past vulnerability history and the absence of explicit authorization checks on its shortcode are points of concern. The plugin is relatively secure due to its minimal attack surface and good coding hygiene, but users should remain vigilant regarding future updates and the potential for new vulnerabilities, especially given the historical XSS issue. The absence of capability checks on the shortcode is a weakness that, while not currently exploitable due to other code characteristics, represents a risk if the shortcode's functionality changes.

Key Concerns

  • Known CVE (medium severity)
  • Shortcode lacks capability checks
Vulnerabilities
1

Ragic Shortcode Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-11431medium · 6.4Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Ragic Shortcode <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting

Nov 27, 2024 Patched in 1.3 (1d)
Code Analysis
Analyzed Mar 16, 2026

Ragic Shortcode Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Ragic Shortcode Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ragic] ragic.php:55
Maintenance & Trust

Ragic Shortcode Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedNov 22, 2024
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs80
Developer Profile

Ragic Shortcode Developer Profile

ragicsupport

1 plugin · 80 total installs

94
trust score
Avg Security Score
91/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Ragic Shortcode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ragic-shortcode/intl/common/load.js/wp-content/plugins/ragic-shortcode/intl/common/loadfts.js
Script Paths
//a.hostname/intl/common/load.js?wp//a.hostname/intl/common/loadfts.js?wp
Version Parameters
ragic-shortcode/intl/common/load.js?ver=ragic-shortcode/intl/common/loadfts.js?ver=

HTML / DOM Fingerprints

CSS Classes
ragic_rawembed
HTML Comments
* * CONFIGURATION VARIABLES: EDIT BEFORE PASTING INTO YOUR WEBPAGE * * * * DON'T EDIT BELOW THIS LINE * *
Data Attributes
sandbox="allow-modals allow-forms allow-popups allow-scripts allow-same-origin"
JS Globals
ragic_urlragic_featurewebFormVersionIsNew
Shortcode Output
<div id='ragic_webview'></div><div style='height:200;width:300;text-align:center'><h3>There is something wrong with your short code parameter!</h3></div>
FAQ

Frequently Asked Questions about Ragic Shortcode