RDP Wiki Embed Security & Risk Analysis

wordpress.org/plugins/rdp-wiki-embed

RDP Wiki Embed lets you embed content from MediaWiki sites.

400 active installs v1.2.20 PHP + WP 3.0+ Updated Jan 8, 2024
mediawikiwikiwiki-embed
63
C · Use Caution
CVEs total1
Unpatched1
Last CVEApr 4, 2025
Safety Verdict

Is RDP Wiki Embed Safe to Use in 2026?

Use With Caution

Score 63/100

RDP Wiki Embed has 1 unpatched vulnerability. Evaluate alternatives or apply available mitigations.

1 known CVE 1 unpatched Last CVE: Apr 4, 2025Updated 2yr ago
Risk Assessment

The 'rdp-wiki-embed' plugin v1.2.20 exhibits a mixed security posture. On the positive side, the plugin demonstrates good practices by utilizing prepared statements for all SQL queries and implementing capability checks for some operations. There are no detected critical or high severity taint flows, and the overall attack surface through AJAX and REST API is zero, which is excellent. However, significant concerns arise from the 1 unpatched medium severity CVE, which indicates a known historical weakness that remains unresolved. The plugin also shows a substantial proportion of improperly escaped output (45%), suggesting a potential for Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not handled carefully in the remaining unescaped outputs. The absence of nonce checks, especially in conjunction with potential XSS risks, is a worrying sign for CSRF vulnerabilities. The plugin's past vulnerability history, specifically related to CSRF, further exacerbates these concerns.

While the plugin has no direct exploitable entry points without authentication in its current state, the combination of an unpatched CVE, a high percentage of unescaped output, and a lack of nonce checks presents a tangible risk. The unpatched CVE is the most immediate and critical concern, as it signifies a known, exploitable flaw. The unescaped output and missing nonce checks create an environment where new vulnerabilities could be introduced or exploited more easily, especially by attackers leveraging the historical CSRF trend. The plugin needs immediate attention to address the unpatched vulnerability and to improve output escaping and implement nonce checks to achieve a more robust security posture.

Key Concerns

  • Unpatched Medium CVE exists
  • Significant unescaped output detected
  • No nonce checks implemented
Vulnerabilities
1

RDP Wiki Embed Security Vulnerabilities

CVEs by Year

1 CVE in 2025 · unpatched
2025
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2025-32262medium · 4.3Cross-Site Request Forgery (CSRF)

RDP Wiki Embed <= 1.2.20 - Cross-Site Request Forgery

Apr 4, 2025Unpatched
Code Analysis
Analyzed Mar 16, 2026

RDP Wiki Embed Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
35
42 escaped
Nonce Checks
0
Capability Checks
2
File Operations
2
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

55% escaped77 total outputs
Attack Surface

RDP Wiki Embed Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[rdp-wiki-embed] index.php:144
WordPress Hooks 13
filterrdp_ppe_allow_shortcodeindex.php:82
filterthe_contentindex.php:142
actionwp_enqueue_scriptsindex.php:146
actionwp_enqueue_scriptsindex.php:147
filtertemplate_includeindex.php:149
actionadmin_footerindex.php:161
actionadmin_menuindex.php:162
actionadmin_initindex.php:163
actionmedia_buttonsindex.php:164
actionrdp_we_cron_hookindex.php:223
actionwp_loadedindex.php:233
actionwp_footerpl\rdpWE.php:92
filterplugin_action_linkspl\rdpWEAdminMenu.php:90

Scheduled Events 1

rdp_we_cron_hook
Maintenance & Trust

RDP Wiki Embed Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedJan 8, 2024
PHP min version
Downloads18K

Community Trust

Rating100/100
Number of ratings12
Active installs400
Developer Profile

RDP Wiki Embed Developer Profile

Robert D Payne

2 plugins · 410 total installs

76
trust score
Avg Security Score
74/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RDP Wiki Embed

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rdp-wiki-embed/css/rdpWE.css/wp-content/plugins/rdp-wiki-embed/js/rdpWE.js/wp-content/plugins/rdp-wiki-embed/js/rdpWE.admin.js/wp-content/plugins/rdp-wiki-embed/css/rdpWE.admin.css/wp-content/plugins/rdp-wiki-embed/css/simple_html_dom.css
Version Parameters
/wp-content/plugins/rdp-wiki-embed/css/rdpWE.css?ver=/wp-content/plugins/rdp-wiki-embed/js/rdpWE.js?ver=/wp-content/plugins/rdp-wiki-embed/js/rdpWE.admin.js?ver=/wp-content/plugins/rdp-wiki-embed/css/rdpWE.admin.css?ver=/wp-content/plugins/rdp-wiki-embed/css/simple_html_dom.css?ver=

HTML / DOM Fingerprints

CSS Classes
rdp-wiki-embed-contentrdp-wiki-embed-sourcerdp-wiki-embed-title
HTML Comments
<!-- BEGIN WIKI EMBED --><!-- END WIKI EMBED -->
Data Attributes
data-wiki-embed-shortcodedata-wiki-urldata-wiki-titledata-wiki-embed-options
JS Globals
rdpWEConfigrdpWEInstance
REST Endpoints
/wp-json/rdp-wiki-embed/v1/content
Shortcode Output
[rdp-wiki-embed[/rdp-wiki-embed]
FAQ

Frequently Asked Questions about RDP Wiki Embed