
Recipe Rating Security & Risk Analysis
wordpress.org/plugins/recipe-ratingThis plugin helps to rate the recipe of post.
Is Recipe Rating Safe to Use in 2026?
Generally Safe
Score 85/100Recipe Rating has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "recipe-rating" plugin v1.5.0 presents a concerning security posture due to significant vulnerabilities identified in the static analysis, despite a clean vulnerability history. The plugin has a small attack surface, with only one entry point, an AJAX handler. However, this handler lacks authentication checks, making it a direct and unprotected avenue for potential attackers. The taint analysis reveals three high-severity flows with unsanitized paths, indicating that user-supplied data is not being properly validated or sanitized before being used in potentially dangerous operations. Furthermore, all three SQL queries within the plugin are executed without prepared statements, increasing the risk of SQL injection vulnerabilities. While the plugin has no recorded CVEs and a history of good security, this current analysis highlights a significant deviation from secure coding practices. The lack of capability checks and nonce checks on the AJAX handler exacerbates these risks, as it allows any user, including unauthenticated ones, to trigger the vulnerable code. The presence of file operations also warrants attention, especially when combined with unsanitized path flows.
In conclusion, while the "recipe-rating" plugin benefits from a clean historical record, the static analysis reveals critical security weaknesses. The unprotected AJAX handler, coupled with high-severity unsanitized taint flows and raw SQL queries, creates a substantial risk of exploitation, potentially leading to unauthorized data manipulation or access. The lack of essential security checks like nonce and capability verifications further amplifies these concerns. Developers should prioritize addressing these identified issues to secure the plugin against potential attacks.
Key Concerns
- AJAX handler without auth checks
- High severity unsanitized taint flows
- All SQL queries without prepared statements
- No nonce checks
- No capability checks
- File operations found
Recipe Rating Security Vulnerabilities
Recipe Rating Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Recipe Rating Attack Surface
AJAX Handlers 1
WordPress Hooks 7
Maintenance & Trust
Recipe Rating Maintenance & Trust
Maintenance Signals
Community Trust
Recipe Rating Alternatives
WP Recipe Maker
wp-recipe-maker
The easy and user-friendly recipe plugin for everyone. Automatic JSON-LD metadata for food AND how-to recipes will improve your SEO!
Recipe Card Blocks Lite
recipe-card-blocks-by-wpzoom
Recipe Card Blocks with Schema Markup — create SEO-optimized recipes with Gutenberg, Elementor & AMP support
Cooked – Recipe Management
cooked
Cooked is the absolute best way to create & display recipes with WordPress. SEO optimized, galleries, timers, and much more.
Delisho – Recipe Widgets and Blocks
dr-widgets-blocks
Delisho includes 12+ Elementor Widgets and 4 Gutenberg blocks for WP Delicious plugin to create a beautiful and SEO-friendly food blog.
Nutrifox WP Connector
nutrifox
Embed Nutrifox labels in WordPress in a moment or less.
Recipe Rating Developer Profile
2 plugins · 0 total installs
How We Detect Recipe Rating
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/recipe-rating/assets/js/rateit-js/scripts/jquery.rateit.min.js/wp-content/plugins/recipe-rating/assets/js/rateit-js/scripts/jquery.rateit.js/wp-content/plugins/recipe-rating/assets/js/rateit-js/scripts/rateit.css/wp-content/plugins/recipe-rating/assets/js/main.jsHTML / DOM Fingerprints
data-rateit-READONLY='true'recipe_objRATE_I18NRECIPE_IDRECIPE_RATINGREADONLY_PLACEHOLDER