ReddiComments Security & Risk Analysis

wordpress.org/plugins/reddicomments

Allows you to easily add any Reddit comment page into your blog post via a shortcode.

10 active installs v0.3 PHP + WP 4.0+ Updated Unknown
commentsreddit
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ReddiComments Safe to Use in 2026?

Generally Safe

Score 100/100

ReddiComments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'reddicomments' plugin version 0.3 presents a mixed security posture. On the positive side, the static analysis indicates no dangerous functions, no SQL queries that are not prepared, no file operations, no external HTTP requests, and no obvious taint flows. The vulnerability history is also clean, with no known CVEs, which suggests a relatively stable and secure past. This indicates that the developers have likely prioritized some fundamental security practices.

However, significant concerns arise from the lack of output escaping and the absence of capability checks and nonce checks. The fact that 100% of the outputs are not properly escaped is a major red flag, potentially leading to cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without sanitization. Furthermore, the absence of nonce checks and capability checks on the identified entry points, even though the attack surface appears small (1 shortcode, 0 unprotected), means that actions triggered by the shortcode could be performed by unauthenticated or unauthorized users.

In conclusion, while the plugin shows strengths in areas like SQL handling and avoiding dangerous functions, the critical omissions in output escaping and authorization mechanisms create a substantial security risk. The clean vulnerability history is a positive but cannot entirely offset the immediate threats identified in the static analysis. Addressing the unescaped output and implementing proper authorization checks are paramount for improving the plugin's security.

Key Concerns

  • Unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

ReddiComments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ReddiComments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped3 total outputs
Attack Surface

ReddiComments Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[reddiComments] reddicomments.php:33
WordPress Hooks 1
actionadmin_initreddicomments.php:34
Maintenance & Trust

ReddiComments Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ReddiComments Developer Profile

Al Mithani

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ReddiComments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<p>Comments by ReddiComments<a href='' target="_blank">Join the conversation on Reddit!</a><iframe src='http://reddicomments.com/reddicomments/?url=
FAQ

Frequently Asked Questions about ReddiComments