
Ratify Security & Risk Analysis
wordpress.org/plugins/ratifyA plugin that helps keep us from publishing sites with basic configuration errors. It is an automated checklist of common issues in WordPress sites.
Is Ratify Safe to Use in 2026?
Generally Safe
Score 85/100Ratify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "ratify" plugin v1.1.1 presents a mixed security profile. On the positive side, the plugin demonstrates good practices in SQL query handling and output escaping, with all queries using prepared statements and all outputs being properly escaped. It also has no known CVEs, suggesting a history of stable security. However, significant concerns arise from the static analysis. The presence of the `exec` function, a powerful and often dangerous function, combined with two identified taint flows with unsanitized paths (classified as critical severity), indicates a high potential for code injection vulnerabilities if these flows are triggered by user-supplied data. The complete lack of nonce checks and capability checks on entry points, while the static analysis reports zero unprotected entry points, suggests that either the reported entry points are not user-facing or the analysis might be incomplete in identifying all potential interaction vectors. This absence of checks is a fundamental security weakness that could be exploited if any of the analyzed taint flows can be influenced by an attacker.
The plugin's vulnerability history is clean, with zero recorded CVEs. This is a positive indicator of past security diligence. However, the current critical taint flows and the use of `exec` pose a latent risk that has not yet manifested as a public vulnerability. The plugin's strengths lie in its careful handling of database interactions and output, but its weaknesses in input validation and the presence of dangerous functions create a substantial risk that requires immediate attention. Despite a clean vulnerability history, the critical taint analysis points to a serious potential for exploitation.
Key Concerns
- Critical severity taint flow with unsanitized paths
- Critical severity taint flow with unsanitized paths
- Use of dangerous function 'exec'
- No nonce checks
- No capability checks
Ratify Security Vulnerabilities
Ratify Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
Ratify Attack Surface
WordPress Hooks 12
Maintenance & Trust
Ratify Maintenance & Trust
Maintenance Signals
Community Trust
Ratify Alternatives
Auto Image Attributes From Filename With Bulk Updater (Add Alt Text, Image Title For Image SEO)
auto-image-attributes-from-filename-with-bulk-updater
Automatically add Image Alt Text, Title, Caption and Description from Filename. Bulk update existing images. Great for Image SEO and Accessibility.
Auto Alt Text
auto-alt-text
This plugin allows you to automatically generate an Alt Text for images uploaded into the media library via AI.
Editoria11y Accessibility Checker
editoria11y-accessibility-checker
Content accessibility checker written to be intuitive and useful for non-technical authors and editors.
Fix Alt Text
fix-alt-text
Manage alt text site-wide easily with Fix Alt Text. You can also force users to use alt text when adding images in Gutenberg and Classic editors.
Custom Alt Text for Elementor Images
custom-alt-text-for-elementor-images
This plugin allows you to set a custom alternative text to each instance of an image widget that you add to a post or page using the Elementor Editor.
Ratify Developer Profile
1 plugin · 10 total installs
How We Detect Ratify
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/ratify/ratify-admin.css/wp-content/plugins/ratify/ratify-admin.jsratify-admin?ver=HTML / DOM Fingerprints
window._wpemojiSettings