Search Relevance Security & Risk Analysis

wordpress.org/plugins/searchrelevance

Adjust WordPress search results to order by relevance, not by date.

60 active installs v2.0.0 PHP + WP 3.6.0+ Updated Sep 23, 2013
relavencerelaventrelevancerelevantsearch
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Search Relevance Safe to Use in 2026?

Generally Safe

Score 85/100

Search Relevance has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of "searchrelevance" v2.0.0 plugin indicates a generally good security posture. There are no identified entry points like AJAX handlers, REST API routes, or shortcodes that are unprotected, which significantly limits the plugin's attack surface. Furthermore, the code does not utilize dangerous functions, perform file operations, or make external HTTP requests, all of which are positive security indicators. The complete absence of raw SQL queries and the consistent use of prepared statements demonstrate strong practices in database interaction, and the single capability check suggests some level of authorization awareness.

However, a notable concern arises from the output escaping. With only 44% of outputs properly escaped, there is a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. If user-supplied data is displayed without adequate sanitization in these unescaped outputs, an attacker could inject malicious scripts. While the taint analysis shows no flows with unsanitized paths, this is based on the zero flows analyzed, making it inconclusive. The plugin's vulnerability history is clean, with no known CVEs, which is positive, but this also means there's no past performance data to assess their track record in addressing security issues. Overall, while the plugin excels in reducing direct attack vectors and securing database operations, the inadequate output escaping presents a significant and actionable risk.

Key Concerns

  • Insufficient output escaping (44% proper)
Vulnerabilities
None known

Search Relevance Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Search Relevance Release Timeline

v2.0.0Current
v1.0.0
Code Analysis
Analyzed Mar 16, 2026

Search Relevance Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
4 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

44% escaped9 total outputs
Attack Surface

Search Relevance Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitSearchRelevance.php:45
actionadmin_menuSearchRelevance.php:47
actionadmin_initSearchRelevance.php:48
filterposts_orderbySearchRelevance.php:57
filterposts_fieldsSearchRelevance.php:58
filterplugin_row_metaSearchRelevance.php:60
filterthe_titleSearchRelevance.php:63
filterget_the_excerptSearchRelevance.php:66
Maintenance & Trust

Search Relevance Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedSep 23, 2013
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings4
Active installs60
Developer Profile

Search Relevance Developer Profile

sablednah

2 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Search Relevance

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/searchrelevance/searchrelevance.css/wp-content/plugins/searchrelevance/searchrelevance.js
Version Parameters
searchrelevance/searchrelevance.css?ver=searchrelevance/searchrelevance.js?ver=

HTML / DOM Fingerprints

Data Attributes
id="relevance-text"id="hide-rel"id="hideadmin-rel"id="style-rel"id="highlight"id="custom-excerpt"+1 more
FAQ

Frequently Asked Questions about Search Relevance