
Shortcode Usage Security & Risk Analysis
wordpress.org/plugins/shortcode-usageList the posts and pages where a specific shortcode is used
Is Shortcode Usage Safe to Use in 2026?
Generally Safe
Score 85/100Shortcode Usage has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'shortcode-usage' plugin version 1.0.1 exhibits a generally strong security posture based on the static analysis provided. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with unprotected entry points is a significant positive. Furthermore, the plugin utilizes prepared statements for all its SQL queries and has no recorded vulnerabilities or CVEs, which is highly reassuring. The lack of file operations and external HTTP requests also contributes to its robust security.
However, a notable area of concern is the low percentage of properly escaped output (18%). This indicates a potential risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is not consistently handled with care when displayed. The presence of only one capability check and zero nonce checks, combined with a total of zero unprotected entry points, suggests that any potential vulnerabilities would likely require authenticated access or be triggered in very specific, controlled circumstances. The overall assessment is positive due to the lack of critical technical flaws and a clean vulnerability history, but the output escaping should be addressed to achieve a fully secure state.
Key Concerns
- Low percentage of properly escaped output
- No nonce checks
Shortcode Usage Security Vulnerabilities
Shortcode Usage Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
Shortcode Usage Attack Surface
WordPress Hooks 1
Maintenance & Trust
Shortcode Usage Maintenance & Trust
Maintenance Signals
Community Trust
Shortcode Usage Alternatives
No alternatives data available yet.
Shortcode Usage Developer Profile
3 plugins · 130 total installs
How We Detect Shortcode Usage
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
wrapicon32widefatdata-post-id<h2>Usage of shortcode<th>Type</th><th>Id</th><th>Title</th>