Ratify Security & Risk Analysis

wordpress.org/plugins/ratify

A plugin that helps keep us from publishing sites with basic configuration errors. It is an automated checklist of common issues in WordPress sites.

10 active installs v1.1.1 PHP 7.1+ WP 4.8+ Updated Mar 11, 2020
accessibilitychecklisthtml5seo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ratify Safe to Use in 2026?

Generally Safe

Score 85/100

Ratify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "ratify" plugin v1.1.1 presents a mixed security profile. On the positive side, the plugin demonstrates good practices in SQL query handling and output escaping, with all queries using prepared statements and all outputs being properly escaped. It also has no known CVEs, suggesting a history of stable security. However, significant concerns arise from the static analysis. The presence of the `exec` function, a powerful and often dangerous function, combined with two identified taint flows with unsanitized paths (classified as critical severity), indicates a high potential for code injection vulnerabilities if these flows are triggered by user-supplied data. The complete lack of nonce checks and capability checks on entry points, while the static analysis reports zero unprotected entry points, suggests that either the reported entry points are not user-facing or the analysis might be incomplete in identifying all potential interaction vectors. This absence of checks is a fundamental security weakness that could be exploited if any of the analyzed taint flows can be influenced by an attacker.

The plugin's vulnerability history is clean, with zero recorded CVEs. This is a positive indicator of past security diligence. However, the current critical taint flows and the use of `exec` pose a latent risk that has not yet manifested as a public vulnerability. The plugin's strengths lie in its careful handling of database interactions and output, but its weaknesses in input validation and the presence of dangerous functions create a substantial risk that requires immediate attention. Despite a clean vulnerability history, the critical taint analysis points to a serious potential for exploitation.

Key Concerns

  • Critical severity taint flow with unsanitized paths
  • Critical severity taint flow with unsanitized paths
  • Use of dangerous function 'exec'
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Ratify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Ratify Code Analysis

Dangerous Functions
3
Raw SQL Queries
0
1 prepared
Unescaped Output
0
31 escaped
Nonce Checks
0
Capability Checks
0
File Operations
3
External Requests
7
Bundled Libraries
0

Dangerous Functions Found

execexec( $cmd, $result, $return_var );App\Models\rat-test-gzip.php:47
execexec( $cmd, $result, $return_var );App\Models\rat-test-gzip.php:74
execexec( $cmd, $stdout, $return_val );App\Models\rat-test-html-validity.php:63

SQL Query Safety

100% prepared1 total queries

Output Escaping

100% escaped31 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
runtest (App\Models\rat-test-html-validity.php:38)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Ratify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 12
actionadmin_initApp\Controllers\ratify-loader.php:24
actionadmin_menuApp\Controllers\ratify-loader.php:25
actioninitApp\Controllers\ratify-loader.php:30
actioninitApp\Controllers\ratify-loader.php:31
actioninitApp\Controllers\ratify-loader.php:32
filterstyle_loader_tagApp\Controllers\ratify-loader.php:34
filterscript_loader_srcApp\Controllers\ratify-loader.php:35
actionadmin_enqueue_scriptsApp\Controllers\ratify-loader.php:107
filtertiny_mce_pluginsApp\Models\rat-test-no-emoji.php:68
filteremoji_svg_urlApp\Models\rat-test-no-emoji.php:71
filterthe_generatorApp\Models\rat-test-no-wp-generator.php:60
actionadmin_noticesApp\Models\ratify-notifier.php:47
Maintenance & Trust

Ratify Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMar 11, 2020
PHP min version7.1
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Ratify Developer Profile

secretsource

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ratify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ratify/ratify-admin.css/wp-content/plugins/ratify/ratify-admin.js
Version Parameters
ratify-admin?ver=

HTML / DOM Fingerprints

JS Globals
window._wpemojiSettings
FAQ

Frequently Asked Questions about Ratify