EZ SHORTCURL Shortcodes to Fetch and Parse External Content Security & Risk Analysis

wordpress.org/plugins/shortcurl

Use the shortcodes remote_get and preg_replace to fetch external content and parse it to use on your page or post.

90 active installs v3.17.49 PHP + WP 2.7+ Updated Dec 16, 2017
curlpreg_replaceshortcodestr_replacewp_remote_get
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EZ SHORTCURL Shortcodes to Fetch and Parse External Content Safe to Use in 2026?

Generally Safe

Score 85/100

EZ SHORTCURL Shortcodes to Fetch and Parse External Content has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The shortcurl plugin v3.17.49 presents a mixed security posture. While the static analysis indicates a clean slate regarding SQL injection and taint analysis, with all SQL queries using prepared statements and no critical or high severity taint flows detected, there are several concerning signals. The plugin exhibits a lack of authorization checks, with zero nonce checks and zero capability checks across all identified entry points, including shortcodes, AJAX handlers, and REST API routes. This absence of proper authentication and authorization mechanisms creates a significant risk for unauthorized actions if any of the entry points are exploitable. Furthermore, the presence of the `create_function` dangerous function is a known security risk that can lead to code execution vulnerabilities if not handled with extreme care. The output escaping is also only partially implemented, with over half of the outputs not properly escaped, potentially leading to cross-site scripting (XSS) vulnerabilities.

The plugin's vulnerability history is a significant positive factor, showing no previously recorded CVEs. This suggests a generally well-maintained codebase or limited exposure to advanced security testing. However, the absence of past vulnerabilities should not overshadow the current identified risks. The combination of a large attack surface with zero authorization checks and the presence of dangerous functions outweighs the clean CVE history. The plugin is therefore considered to have a moderate to high risk profile due to the potential for exploitation of its unprotected entry points and the use of insecure coding practices, despite the lack of historical vulnerabilities.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
  • Presence of dangerous function 'create_function'
  • Low percentage of properly escaped output
Vulnerabilities
None known

EZ SHORTCURL Shortcodes to Fetch and Parse External Content Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

EZ SHORTCURL Shortcodes to Fetch and Parse External Content Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
6
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_action('widgets_init', create_function('', 'return register_widget("SHORTCURL_Widget_Class");'))index.php:237

Output Escaping

54% escaped13 total outputs
Attack Surface

EZ SHORTCURL Shortcodes to Fetch and Parse External Content Attack Surface

Entry Points4
Unprotected0

Shortcodes 4

[preg_replace] index.php:67
[preg_replace_shortcode] index.php:81
[str_replace] index.php:89
[remote_get] index.php:148
WordPress Hooks 3
actionadmin_noticesindex.php:48
filterplugin_row_metaindex.php:62
actionwidgets_initindex.php:237
Maintenance & Trust

EZ SHORTCURL Shortcodes to Fetch and Parse External Content Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 16, 2017
PHP min version
Downloads13K

Community Trust

Rating100/100
Number of ratings5
Active installs90
Developer Profile

EZ SHORTCURL Shortcodes to Fetch and Parse External Content Developer Profile

Eli

9 plugins · 101K total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
782 days
View full developer profile
Detection Fingerprints

How We Detect EZ SHORTCURL Shortcodes to Fetch and Parse External Content

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
SHORTCURL Main Plugin File @package SHORTCURL Copyright © 2012-2017 Eli Scheetz (email: wordpress@ieonly.com) This program is free software; you can redistribute it+8 more
Shortcode Output
[remote_get][preg_replace][preg_replace_shortcode][str_replace]
FAQ

Frequently Asked Questions about EZ SHORTCURL Shortcodes to Fetch and Parse External Content