Read Text File Security & Risk Analysis

wordpress.org/plugins/read-text-file

Allows you to display the contents of a text file within a post by adding a simple shortcode and including a path from the root folder.

60 active installs v0.1 PHP + WP 3.0+ Updated Sep 15, 2011
filereadshortcodetext
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Read Text File Safe to Use in 2026?

Generally Safe

Score 85/100

Read Text File has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The 'read-text-file' v0.1 plugin exhibits a seemingly strong security posture based on the static analysis provided. There are no detected dangerous functions, all SQL queries utilize prepared statements, and all output appears to be properly escaped. Furthermore, the plugin has no recorded vulnerability history, suggesting a history of responsible development or a lack of significant past exposure. The absence of file operations and external HTTP requests also minimizes common attack vectors.

However, the analysis does raise some concerns. The plugin has a total of one entry point, a shortcode, which has no explicitly stated authentication or capability checks. While this might be intentional if the shortcode is designed to be publicly accessible and only reads innocuous files, it represents a potential area for concern if the shortcode's functionality could be misused. The lack of nonce checks, while not a direct vulnerability in itself, is a missed opportunity to further secure the plugin's operations if any interactions were to occur via AJAX or other request types.

In conclusion, the plugin demonstrates good practices in core areas like SQL and output handling, and its clean vulnerability history is a positive sign. The primary area of attention is the shortcode's lack of explicit authorization checks, which, depending on its intended functionality, could represent a minor risk.

Key Concerns

  • Shortcode without capability checks
  • Missing nonce checks
Vulnerabilities
None known

Read Text File Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Read Text File Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Read Text File Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[read-text] read-txt.php:15
Maintenance & Trust

Read Text File Maintenance & Trust

Maintenance Signals

WordPress version tested3.2.1
Last updatedSep 15, 2011
PHP min version
Downloads4K

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Read Text File Developer Profile

Aaron Sonnenberg

1 plugin · 60 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Read Text File

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<div style="clear:both;">
FAQ

Frequently Asked Questions about Read Text File