Recipe Rating Security & Risk Analysis

wordpress.org/plugins/recipe-rating

This plugin helps to rate the recipe of post.

0 active installs v1.5.0 PHP 7.2+ WP 5.4+ Updated May 7, 2020
biryani-recipechicken-recipereciperecipe-ratingrecipes
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Recipe Rating Safe to Use in 2026?

Generally Safe

Score 85/100

Recipe Rating has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "recipe-rating" plugin v1.5.0 presents a concerning security posture due to significant vulnerabilities identified in the static analysis, despite a clean vulnerability history. The plugin has a small attack surface, with only one entry point, an AJAX handler. However, this handler lacks authentication checks, making it a direct and unprotected avenue for potential attackers. The taint analysis reveals three high-severity flows with unsanitized paths, indicating that user-supplied data is not being properly validated or sanitized before being used in potentially dangerous operations. Furthermore, all three SQL queries within the plugin are executed without prepared statements, increasing the risk of SQL injection vulnerabilities. While the plugin has no recorded CVEs and a history of good security, this current analysis highlights a significant deviation from secure coding practices. The lack of capability checks and nonce checks on the AJAX handler exacerbates these risks, as it allows any user, including unauthenticated ones, to trigger the vulnerable code. The presence of file operations also warrants attention, especially when combined with unsanitized path flows.

In conclusion, while the "recipe-rating" plugin benefits from a clean historical record, the static analysis reveals critical security weaknesses. The unprotected AJAX handler, coupled with high-severity unsanitized taint flows and raw SQL queries, creates a substantial risk of exploitation, potentially leading to unauthorized data manipulation or access. The lack of essential security checks like nonce and capability verifications further amplifies these concerns. Developers should prioritize addressing these identified issues to secure the plugin against potential attacks.

Key Concerns

  • AJAX handler without auth checks
  • High severity unsanitized taint flows
  • All SQL queries without prepared statements
  • No nonce checks
  • No capability checks
  • File operations found
Vulnerabilities
None known

Recipe Rating Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Recipe Rating Code Analysis

Dangerous Functions
0
Raw SQL Queries
3
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared3 total queries

Output Escaping

75% escaped4 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
r_the_content (index.php:106)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
1 unprotected

Recipe Rating Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_r_rate_recipeindex.php:35
WordPress Hooks 7
actioninitindex.php:31
actionsave_post_recipeindex.php:32
filterthe_contentindex.php:33
actionwp_enqueue_scriptsindex.php:34
actionadmin_initindex.php:36
filtermanage_recipe_posts_columnsindex.php:201
actionmanage_recipe_posts_custom_columnindex.php:202
Maintenance & Trust

Recipe Rating Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 7, 2020
PHP min version7.2
Downloads865

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Recipe Rating Developer Profile

riteshghimire9090

2 plugins · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Recipe Rating

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/recipe-rating/assets/js/rateit-js/scripts/jquery.rateit.min.js/wp-content/plugins/recipe-rating/assets/js/rateit-js/scripts/jquery.rateit.js/wp-content/plugins/recipe-rating/assets/js/rateit-js/scripts/rateit.css/wp-content/plugins/recipe-rating/assets/js/main.js

HTML / DOM Fingerprints

Data Attributes
data-rateit-READONLY='true'
JS Globals
recipe_obj
Shortcode Output
RATE_I18NRECIPE_IDRECIPE_RATINGREADONLY_PLACEHOLDER
FAQ

Frequently Asked Questions about Recipe Rating