Shortcodes In Use Security & Risk Analysis

wordpress.org/plugins/shortcodes-in-use

List all the shortcodes that you have used within your content or custom fields, and find out exactly where they have been used.

80 active installs v1.2.1 PHP + WP 3.8+ Updated Jan 26, 2016
adminfindlocateshortcodetool
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Shortcodes In Use Safe to Use in 2026?

Generally Safe

Score 85/100

Shortcodes In Use has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "shortcodes-in-use" plugin v1.2.1 presents a generally good security posture based on the provided static analysis and vulnerability history. The plugin demonstrates strong adherence to secure coding practices by utilizing prepared statements for all SQL queries and implementing capability checks and nonce checks for its single shortcode entry point. The absence of external HTTP requests, file operations, and dangerous functions further strengthens its security. The fact that there are no recorded vulnerabilities, past or present, is a significant positive indicator of the developer's attention to security.

However, a key area for concern lies in the output escaping. With 42% of outputs properly escaped, there is a significant portion (58%) that remains unescaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data or dynamic content is directly rendered without proper sanitization. While the taint analysis did not reveal any immediate critical or high-severity flows, the lack of comprehensive output escaping represents the most significant identifiable risk in this plugin's current version. Overall, the plugin is well-developed from a security perspective regarding data handling and access control, but a critical review and remediation of unescaped outputs are recommended.

Key Concerns

  • Low percentage of properly escaped outputs
Vulnerabilities
None known

Shortcodes In Use Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Shortcodes In Use Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
14
10 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

42% escaped24 total outputs
Attack Surface

Shortcodes In Use Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[shortcodes_in_use] shortcodes-in-use.php:606
WordPress Hooks 4
actionplugins_loadedshortcodes-in-use.php:38
actionadmin_menushortcodes-in-use.php:112
actionwidgets_initshortcodes-in-use.php:114
actionadmin_enqueue_scriptsshortcodes-in-use.php:167
Maintenance & Trust

Shortcodes In Use Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedJan 26, 2016
PHP min version
Downloads6K

Community Trust

Rating100/100
Number of ratings8
Active installs80
Developer Profile

Shortcodes In Use Developer Profile

wizzud

3 plugins · 3K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Shortcodes In Use

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shortcodes-in-use/css/style.css
Script Paths
/wp-content/plugins/shortcodes-in-use/js/shortcodes-in-use.js
Version Parameters
shortcodes-in-use/css/style.css?ver=shortcodes-in-use/js/shortcodes-in-use.js?ver=

HTML / DOM Fingerprints

CSS Classes
s-i-u_redshortcodes-in-use-results-tables-i-u-admin-page
JS Globals
shortcodes_in_use_obj
FAQ

Frequently Asked Questions about Shortcodes In Use