RDFaCE Security & Risk Analysis

wordpress.org/plugins/rdface

Enables semantic content authoring based on RDFa and Microdata (Schema.org).

10 active installs v0.71 beta PHP + WP 3.9.1+ Updated Oct 23, 2015
microdatardfatinymcewysiwygwysiwym
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RDFaCE Safe to Use in 2026?

Generally Safe

Score 85/100

RDFaCE has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of the "rdface" v0.71 beta plugin reveals a seemingly secure attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication checks. The absence of dangerous functions and the exclusive use of prepared statements for SQL queries are also positive indicators. However, a significant concern arises from the complete lack of output escaping, meaning all 5 identified output points are potentially vulnerable to cross-site scripting (XSS) attacks.

The plugin also exhibits a lack of security best practices such as nonce checks and capability checks, which are crucial for preventing unauthorized actions and CSRF vulnerabilities, especially if the attack surface were to expand in future versions. The file operations are numerous, but without further context, it's difficult to assess their inherent risk. The vulnerability history is clean, with no recorded CVEs, which might suggest a well-maintained or less complex plugin, but this is somewhat contradicted by the observed security weaknesses.

In conclusion, while "rdface" v0.71 beta benefits from a limited attack surface and secure SQL practices, the critical deficiency in output escaping presents a tangible XSS risk. The absence of nonce and capability checks further weakens its security posture. The clean vulnerability history is a positive sign, but it should not overshadow the immediate risks identified in the code analysis.

Key Concerns

  • No output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

RDFaCE Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

RDFaCE Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
14
External Requests
0
Bundled Libraries
1

Bundled Libraries

jQuery

Output Escaping

0% escaped5 total outputs
Attack Surface

RDFaCE Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_headrdface.php:17
filtermce_external_pluginsrdface.php:26
filtermce_buttonsrdface.php:28
filtertiny_mce_before_initrdface.php:29
Maintenance & Trust

RDFaCE Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 23, 2015
PHP min version
Downloads5K

Community Trust

Rating80/100
Number of ratings3
Active installs10
Developer Profile

RDFaCE Developer Profile

Ali Khalili

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RDFaCE

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rdface/mce/rdface/libs/jstree/_lib/jquery.cookie.js/wp-content/plugins/rdface/mce/rdface/plugin.min.js/wp-content/plugins/rdface/mce/contextmenu/plugin.min.js/wp-content/plugins/rdface/mce/rdface/css/rdface.css/wp-content/plugins/rdface/mce/rdface/schema_creator/schema_colors.css
Script Paths
/wp-content/plugins/rdface/mce/rdface/libs/jstree/_lib/jquery.cookie.js/wp-content/plugins/rdface/mce/rdface/plugin.min.js/wp-content/plugins/rdface/mce/contextmenu/plugin.min.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about RDFaCE